Professional Documents
Culture Documents
CSS 243
CSS 243
COURSE TITLE:
PRINCIPLES OF SECURITY PRACTICE AND MANAGEMENT
1
CSS 243 Principles of Security Practice and Management
COURSE
GUIDE
CSS243
PRINCIPLES OF SECURITY PRACTICE AND MANAGEMENT
Abisoye M. Alesinloye
O.C.E. Institute, Ibadan,
Ibadan, Oyo State.
2
CSS 243 Principles of Security Practice and Management
Headquarters
14 / 16 Ahmadu Bello Way
Victoria Island
Lagos
Abuja Annex
245 Samuel Adesujo Ademulegun Street
Central Business District
Opposite Arewa Suites
Abuja
e-mail: centralinfo@nou.edu. ng
URL: .nou.edu.ng
ISBN:
Printed by
For
National Open University of Nigeria
3
CSS 243 Principles of Security Practice and Management
TABLE OF CONTENTS
PAGE
4
CSS 243 Principles of Security Practice and Management
CONTRIBUTION
Introduction
CSS 243: Principles of Security Practice and Management is a 3-credit unit course. It
is a compulsory course for all postgraduate students of Criminology and Security
Studies of the University. The course is recommended for any other student(s)
particularly those in the School of Arts and Social Sciences, who may have interest in
secur ity studies. The course can also be taken as elective or required course by other
students whose main field(s) of discipline is not Criminology and Security Studies.
The Course shall consist of 20 units, which include the meaning of security, discourse
on violence and violent crime, domestic violence, theories of violence, theory of
crime control, approaches to security management, intelligence cycle, security
personnel management, and management of job stress among security personnel and
trauma management in security career: REBT. Other areas of discourse are public
relations management in security sector, operational management and capacity
planning, issue of asymmetric aggression in strategic planning, guerilla and counter-
guerilla, fortification and manoeuvre tactics in defence and security management.
The course material draws its major case studies from the Continent of Africa with
particular reference to Nigeria with the aim of ejaculating the students’ desire towards
developing viable analytical and conceptual framework for addressing the security
problems in Nigeria and elsewhere.
The course has no compulsory pre-requisites for it to be registered for. The course
guide informs us on what this course is all about, what student should appreciate in
each unit, what text materials we shall be using and how we can make best use of
these materials. The course guide also discerns the need to take tutored marked
assignments so seriously by student. However, necessary information on tutored
marked assignments shall be made known to students in a separate file, which will be
sent to each student. This course is also supported with periodic tutorial classes.
The overall aim of CSS 243: Principles of Security Practice and Management is to
introduce you to the principles of security management and practice by looking at the
meaning of security and other prominent areas of inquiry and issues in the discourse
of security management. Your understanding of fundamentals in security
management will enable you to explain some basic concepts and approaches security
5
CSS 243 Principles of Security Practice and Management
studies.
In fact, the course will also expose you to various relevant issues in the study of
security management as well as techniques, approaches and challenges to effective
security management and strategic planning. CSS 243 is a very interesting course as it
stimulates our understanding about security practice and management. It helps to
expose us to some of the fundamental ways through which effective security
management can be actualized.
Therefore, this course is so significant as it shows how violence both domestic and
non-domestic constitute act(s) of criminality. The study also draws a line in the
relationship between intention and justifiability of a violent act by examining the
positions articulated by relevant theories on the subject. The study also examines how
intelligence can impact on effective security management. In carrying out this task a
number of issues on intelligence cycle will be discussed such as meaning of
intelligence, its collection and disciplines, its analysis and evaluation as well counter-
intelligence and intelligence security.
Owing to the importance of public relations in security business, the study also
explains the roles and the impact that public relations activity can have on any
security organization especially as it concerns attaining its overall goals. Prior to
discourse on public relations management in security sector, this study has found it
pertinent to focus on a number of issues that bother on personnel management and the
ways to assist security personnel to have a healthy and fulfilled work life, so that they
can carry-out their functions effectively.
However, this study cannot be complete if we fail to discuss the relationship between
operational management and security management. Security business is a very
challenging one. Necessary equipment will need to be provided by security employer
to assist the employees to be functional. We shall also focus on a number of other
issues and tactics that relate to security management.
Course Aims
The main aim of this course is to expose you to the basic concepts, issues, approaches
and practice that have attracted a great attention among scholars and policy makers in
security management.
The study also throws its search-light on the issues in security discourse, which have
continued to attract growing attention among scholars in security studies. These
issues have remained subjects, which have been baptized with several conceptual and
theoretical positions of scholars.
This course also x-rays a number of security challenges that nations face in the
contemporary time as well as a shift from the traditional security management system
to non-traditional order. Several (inter) governmental and non governmental
6
CSS 243 Principles of Security Practice and Management
Course Objectives
With utmost desire to achieve the aims set out above, the course has some set of
7
CSS 243 Principles of Security Practice and Management
objectives as demonstrated in all the units of the course. Each unit has its own
objectives. Objectives are always included at the beginning of every unit to assist the
student in the appreciation of what he or she will come across in the study of each
unit to facilitate his or her better understanding of the course-CSS 243 (Principles of
Security Practice and Management).
Student is therefore advised to read these objectives before studying the entire unit(s).
Thus, it is helpful to do so. You should always look at the unit objectives after
completing a unit. In this way, you can be sure that you have done what was required
of you by the unit.
Stated below are the wider objectives of this course as a whole. By meeting these
objectives, you should have achieved the aims of the course as a whole.
8
CSS 243 Principles of Security Practice and Management
In completing this course, student is required to study the whole units, and try to read
all (or substantial number of) the recommended textbooks, journals and other reading
materials including electronic resources. Each unit contains self assessment
exercise(s) and student is required to submit his or her assignment for the purpose of
assessment.
At the end of the course, student(s) shall be examined. The time of the final
examination and venue shall be communicated to all the registered students in due
course by relevant school authorities-study centre management. Below are the
components of the course and what you are required to do.
Course Materials
1. Course Guide
2. Study Units
3. Textbooks
4. Assignments File
5. Presentation Schedule
It is incumbent upon every student to get his or her own copy of the course material.
You are also advised to contact your tutorial facilitator, if you have any difficulty in
getting any of the text materials recommended for your further reading.
Study Units
9
CSS 243 Principles of Security Practice and Management
The first five units are centered on the meaning of security, violence, theories of
violence and theory of crime control. The second set of units explains approaches to
security management, intelligence cycle and intelligence security management. The
following set of five units focuses on principles, approaches and strategic issues in
security personnel management and public relations management in security sector.
The last five units emphasize on the importance of operational management and
capacity planning in security management, the growing threat of asymmetric
aggression to inter (national security, counter-guerilla (insurgency) techniques, and
fortification and manoeuvre tactics in security management.
In each segment of each unit, you have at least one self assessment exercise, which
helps you to know how far you have progressed in understanding the content of each
unit. These self assessment exercises and tutor-marked assignments create a great
opportunity for student to achieve the overall objectives of the course.
Set Textbooks
The following textbooks are recommended to each student taking the course. The first
four textbooks are compulsory for your study of this course.
3. Tickner, J.A. (1994) “Re-visioning Security” in Ken Booth and Steve Smiths
(eds)., International Relations Theory Today,
10
CSS 243 Principles of Security Practice and Management
11. Goode, William (1971), “Force and Violence in the Family”, Journal of
Marriage and the Family, 33.
12. Indik, A. P., Seashere O. T. et.al. al., (1964), “Occupational Stress, its Causes
and Consequences for Job Performance”, Journal of Applied Psychology. 71.
13. Ellis, Albert (1975), A Guide to Rational Living, Wilshire Book Company.
Cutlip, Scott M., Allen H. Center & Glen M. Broom (1994), Effective Public
Relations, 7th Edition, Englewood Cliffs, N.J.: Prentice-Hall, Inc. A Simon and
Schuster Company.
14. Krajewski, Lee J., & Ritzman, Larry P. (2005), Operations Management:
Processes and Value Chains, Upper Saddle River, New Jersey: Prentice Hall
15. Giap, Vo Nguyen (2001), People's War, People's Army, Honolulu, University
Press of the Pacific.
Assignment File
In this file, you will find the necessary details of the assignments you must submit to
your tutor for assessment. The marks you get from these assignments will form part
of your final assessment in this course.
11
CSS 243 Principles of Security Practice and Management
Presentation Schedule
The Presentation Schedule included in your course materials gives you the important
dates for the completion of tutor-marked assignments and attending tutorials.
Remember, you are required to submit all your assignments by the due date. You
should guard against falling behind in your work.
Assessment
There are two aspects to the assessment of the course. First are the tutor-marked
assignments; second, there is a written examination. In tackling the assignments, you
are expected to apply information and knowledge acquired during this course.
The assignments must be submitted to your tutor for assessment in accordance with
the deadlines stated in the Assignment File. The work you submit to your tutor for
assessment will count for 30% of your total course mark. At the end of the course,
you will need to sit for a final three-hour examination. This will also count for 70% of
your total course mark.
There are twenty tutor-marked assignments in this course. You need to submit four
assignments out which the best three will be used for your assessment. These three
assignments shall be 30% of your total course mark.
Assignment questions for the units in this course are contained in the Assignment
File. You should be able to complete your assignments from the information and
materials contained in your set textbooks, reading and study units. However, you are
advised to use other references to broaden your viewpoint and provide a deeper
understanding of the subject.
When you have completed each assignment, send it, together with TMA (tutor-
marked assignment) file to your tutor. Make sure that each assignment gets to your
tutor on or before the deadline. However, in case of being unable to complete your
work on time, contact your tutor before the submission deadline of assignments
elapses to discuss the possibility of an extension.
The final examination of CSS 643 will be of three hours’ duration and have a value of
70% of the total course grade. The examination shall consist of questions which
reflect the type of self-testing, practice exercises and tutor-marked problems you have
come across. All areas of the course will be assessed.
12
CSS 243 Principles of Security Practice and Management
You are advised to revise the entire course after studying the last unit before you sit
for the examination. You will find it useful to review your tutor-marked assignments
and the comments of your tutor on them before the final examination.
Assessment Marks
Assignment 1 – 4 Four Assignments are to
submitted,
of which the three best shall be
considered at 10% each, maki
30% of
the overall scores
Final Examination 70% of overall course marks
Total 100% of course marks
Course Overview
This table brings together the entire units contained in this course, the number of
weeks you should take to complete them, and the assignments that follow them.
13
CSS 243 Principles of Security Practice and Management
In distance learning the study units replace the university lecturer. This is one of the
great advantages of distance learning; you can read and work through specially
designed study materials at your own pace, and at a time and place that suit you best.
Think of it as reading the lecture instead of listening to a lecturer.
In this same way that a lecturer might set you some reading to do, the study units tell
you when to read your set of books or other materials. Just as a lecturer might give
you an in-class exercise, your study units provide exercises for you to do at
appropriate points.
Each of the study units follows a common format. The first item is an introduction to
the subject matter of the unit and how a particular unit is integrated with the other
units and the course as a whole. Next is a set of learning objectives. These objectives
shall let you know what you should be able to do by the time you have completed the
unit.
14
CSS 243 Principles of Security Practice and Management
Thus, you should use these objectives to guide your study. When you have finished,
the units you must go back and check whether you have achieved the objectives. If
you make a habit of doing this you will significantly improve your chances of passing
the course. The main body of the unit guides you through the required reading from
other sources.
Reading Section
Remember that your tutor’s job is to assist you. When you need help, don’t hesitate to
call and ask your tutor to provide it.
2. Organize a study schedule. Refer to the ‘Course overview’ for more details. Note the
time you are expected to spend on each unit and how the assignments related to the
units. Whatever method you chose to use, you should decide on and write in your
own dates for working on each unit.
3. Once you have created your own study schedule, do everything you can to stick to it.
The major reason that students fail is that they get behind with their course work. If
you get into difficulties with your schedule, please let your tutor know before it is too
late for help.
4. Turn to Unit 1 and read the introduction and the objectives for the unit.
5. Assemble the study materials. Information about what you need for a unit is given in
the ‘Overview’ at the beginning of each unit. You will almost always need both the
study unit you are working on and one of your set books on your desk at the same
time.
6. Work through the unit. The content of the unit itself has been arranged to provide a
sequence for you to follow. As you work through the unit you will be instructed to
read sections from your set books or other articles. Use the unit to guide your reading.
7. Review the objectives for each study unit to confirm that you have achieved them. If
you feel unsure about any of the objectives, review the study material or consult your
tutor.
8. When you are confident that you have achieved a unit’s objectives, you can then start
on the next unit. Proceed unit by unit through the course and try to pace your study so
that you keep yourself on schedule.
9. When you have submitted an assignment to your tutor for marking, do not wait for its
return before starting on the next unit. Keep to your schedule. When the assignment is
returned, pay particular attention to your tutor’s comments, both on the tutor-marked
assignment form and also on what is written on the assignment. Consult your tutor as
15
CSS 243 Principles of Security Practice and Management
10. After completing the last unit, review the course and prepare yourself for the final
examination. Check that you have achieved the unit objectives (listed at the beginning
of each unity) and the course objectives (listed in this Course Guide).
There are between eight and 12 hours of tutorials provided in support of this course.
The dates, time and venue of these tutorials shall be communicated to you. The name
and phone number of your tutor will be made known to you immediately you are
allocated a tutorial group.
Your tutor will mark and comment on your assignments, keep a close watch on your
progress and on any difficulties you might encounter and provide assistance to you
during the course. You must mail your tutor-marked assignments to your tutor well
before the due date (at least two working days are required). They will be marked by
your tutor and returned to you as soon as possible. Do not hesitate to contact your
tutor by telephone, e-mail, or discussion board if you need help. You will definitely
benefit a lot by doing that. Contact your tutor if:
• you do not understand any part of the study units or the assigned readings,
• you have difficulty with the self-tests or exercises,
• you have a question or problem with an assignment, with your tutor’s
comments on
an assignment or with the grading of an assignment.
You should make an effort to attend the tutorials. Thus, it is the only opportunity you
have to enjoy face to face contact with your tutor and to ask questions which are
answered instantly. You can raise any problem encountered in the course of your
study. To gain the maximum benefit from course tutorials, prepare a question list
before attending them. You will learn a lot from participating in discussion actively.
Summary
CSS 643 aims to expose you to basic principles, approaches, theories and efforts in
security practice and management. As you complete this course, you should be able
to answer the following questions:
16
CSS 243 Principles of Security Practice and Management
Finally, you are advised to read the course material appreciably well in order to
prepare fully and not to be caught pants down by the final examination questions. So,
we sincerely wish you success in your academic career as you will find this course
(CSS 643) very interesting. You should always avoid examination malpractices!
17
CSS 243 Principles of Security Practice and Management
CSS643
PRINCIPLES OF SECURITY PRACTICE AND MANAGEMENT
Abisoye M. Alesinloye
O.C.E. Institute, Ibadan,
Ibadan, Oyo State.
18
CSS 243 Principles of Security Practice and Management
Abuja Annex
245 Samuel Adesujo Ademulegun Street
Opposite Arewa Suites
Abuja
e-mail: centralinfo@nou.edu.ng
URL: www.nou.edu.ng
ISBN: 978-058-949-X
Printed by----------------------
For
National Open University of Nigeria
19
CSS 243 Principles of Security Practice and Management
TABLE OF CONTENTS
PAGE
20
CSS 243 Principles of Security Practice and Management
MODULE 1
Unit 1
MEANING OF SECURITY
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Definition of Secur ity
3.2 Types of Security
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0. INTRODUCTION
Security has been a subject that has attracted a rapidly growing interest and
concern among the scholar in social science in which a wide spectrum of issues
on the subject – security has remained persistent in which new breakthroughs and
findings are still being made, showing the strategic importance of security in the
development of nations and actualization of peace and order in all levels of
human relations.
It is no surprising that the increasing research attention given to the concept and
practice of research attention given to the concept and practice of security has
brought about invocation of different types, dimension of analytical explanations
and theoretical approaches. In this unit, we shall be focusing on the meaning of
security. It is our belief, that, it is when we do this, that other issues or topics of
discourse can be meaning fully appreciated by the reader (student).
2.0 OBJECTIVES
21
CSS 243 Principles of Security Practice and Management
22
CSS 243 Principles of Security Practice and Management
Not only in terms of the internal security of the State, but also in terms
of secure systems of Food health, money and trade (Tickner, 1994:180).
Exercise
Define the term Security.
(a) Food security: This underscores the strategic importance that self sustenance
in food production has on the security of any nation. Though, the interdependence
that dominates relations among nations also covers food. This is because there are
particular types of agricultural items that cannot be acculturated in one country or
the other.
Notwithstanding, some normal food items like rice, millets and others need to be
made available to the people, even at cheap rate, because food is no luxury but a
necessity. Secure society will always adopt strategy to produce its food locally,
trying as much as possible to avoid importing the food items it can produce
locally. Nigeria began to experience deepened crisis and insecurity since the
emergence of oil boom in the 1970s, when our problem was not basically how to
generate funds but how to spend it.
Thus, the situation brought about by the petrol-dollar regime led to the demise of
productive agricultural activities in the country Nigeria. Nigeria that used to be
one of the greatest food baskets and a major exporter of agricultural products
overnight became a perpetual importer of food items. The agricultural sector has
however become moribund. More than 70% of urban dwellers go about in cobra
face (fierce looking), eating thrice a day becomes a very difficult task. A hungr y
man is an angry man! There is palpable tension every where, creating a high
degree of insecurity both in public and private domains.
23
CSS 243 Principles of Security Practice and Management
youths in the region, which has been one of the factors responsible for the culture
of religious crises among these diverse people (Lubeck, 1991:186).
(b) Health Security: This involves safety against HIV-AIDS pandemics and other
diseases like malaria that accounts for a very high mortality rate. It is part of
government responsibilities to provide health security for its citizens, knowing the
impact that good health condition(s) can have on the development of any country.
That is why in advanced countries, government provides platform to promote
healthy living among the people.
Health security is very crucial to national development, and that is the reason why
countries like the United States have created opportunity for people to access
national health insurance scheme, in which everybody will make contribution
(premium) to the scheme. When they fall sick, there is insurance cover that will
take care of their hospital bills according to their policy type(s).
24
CSS 243 Principles of Security Practice and Management
for the increasing criminality and criminal activities among the people especially
the youths.
Within the world body (the United Nations), efforts are being made through its
relevant agency – the United Nations Environment Program (UNEP), to monitor
environmental issues, and make reports and plans for such issues and to act and
promote legal instruments on environment.
Environment has great impact on, which has led to increasing interest of state and
non-state actors on environmental protection and security. The growing interest
since 980s on environmental security has also attracted a number of international
agreements aimed at protecting the environment see table 2.1 for the list of some
of such agreements and when they were signed.
25
CSS 243 Principles of Security Practice and Management
26
CSS 243 Principles of Security Practice and Management
Reflecting on the foregoing table, no less than twenty agreements were reached in
thirteen years. This shows that protecting environment has become a key element
of strategic planning among various nations. Insecure environment is more
susceptible to natural disasters. The damage inflicted on the ozone layer by
several environmental pollutions has been responsible for the change in weather
in which tropical areas like Africa now experience increasing hotness in weather
Apart from that, deforestation has also constituted a great security thereat to
several nations attracting incidence of drought (by making the soil to dry out
faster). Bush burning can lead to economic calamity and environmental
degradation. The issue of oil spillage can also be a source of environmental
image.
This is often experienced in the Niger-Delta region of Nigeria, where oil spillage
usually pollutes the waters and killing the fishes, attracting (violent) conflicts
between the local people and oil companies engaging in exploration in the region.
One basic fact that I will like to bring out at this juncture, is that securing
environment is the beginning of wisdom, so you are admonished to always protect
the environment.
(e) Personal Security: This is type of security which involves protecting every
individual from any physical violence. Therefore both the state and other entities
like any other people or group or people, member(s) of the person’s immediate
family are barred by the law to carry out any action(s) that can cause injury or
death against that individual.
(f) Community Security: This form of security engenders the need to respect
traditional relationships and social values of the people by protecting the people
from losing such communitarian values. Therefore several international and
national institutional frameworks are put in place to ensure freedom of the people
to association (s) does not constitute a security threat), religion etc; and no
violence should be directed to him/her by another person or group of person.
27
CSS 243 Principles of Security Practice and Management
(g) Territorial Security: This denotes protecting the state against any internal
and external aggression. This is one aspect of the United Nations mandate, which
the world body has found crucial to the maintenance of global peace and security.
Exercise
Discuss any five types of security.
4.0 CONCLUSION
There is a new meaning of security since the end of sold war. The world has
realized the need to peopling security, such that management of security has
became a subject of how much a state caters for the wellbeing of its people.
During the cold war, a majority of wars at that time were international but now
political strife, insurgencies and civil wars plague most of the countries. The truth
is that most of these internal wars are created by economic deprivation, (inter)
religious violence, ethnic rivalry, maladministration among others.
Nonetheless, state and non-state actors have a new twist to security discourse by
tracing major threats to security of a nation to its domestic domain rather than
external environment. The use of violence by the state has proved less effective in
the management of security, as focus in now being shifted to providing
empowerment opportunities for such economic security, human rights for the
people as the alternative strategy.
5.0 SUMMARY
In this unit, we have been able to explain the meaning of security. We began our
discourse by looking at various definitions of the term. Various scholars have
however defined the concept (security) differently. But most of these definitions
have demonstrated the importance of providing a viable network of opportunities
in terms of protection of human rights, good governance, access to basic needs,
social justice, accountability etc, to people, as the best form of secur ity.
We also discussed various types of security. It is my belief that you have found
this unit interesting. But, if you have any problem in understanding any segment
(or part) of this unit feel free, to consult your tutorial facilitator. Thank you very
much for your great attention.
28
CSS 243 Principles of Security Practice and Management
Tickner, J.A. (1994) “Re-visioning Security” in Ken Booth and Steve Smiths
(eds). International Relations Theory Today.
Ukeje, Charles (2001), “Youth, Violence and the Collapse of Public Order in the
Niger-Delta of Nigeria”, Africa Development, Vol. XXVI, No. 1 & 2.
Unit 2
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Violence
3.2 Discourse on Justification of Violence
3.3 Forms of Violent Crimes
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
The concept of violence has been a complex one. It can be applied to the
disruption of the peace of any community, as it can also be used to maintain peace
and security. It has continued to be a regular feature in the history of human
civilization. It is exhibited in every level of human relations, from intra-personal
to global. It is no news that violence is sometimes perpetuated against oneself as
evident in some religions where aggression against oneself is seen as a form of
29
CSS 243 Principles of Security Practice and Management
2.0 OBJECTIVES
Violence is a concept that has attracted huge attention among the scholars in
peace and conflict studies, criminology and security studies as well psychology.
Consequently, a lot of definitions have emerged. One of the scholars who have
contributed on the subject (violence) is Arendt who described violence basically
by focusing on its characteristics rather than conceptual definition. She therefore
stressed that “violence” interprets itself basically through the way it “harbours
within itself an….element of arbitrariness….this intrusion of the utterly
unexpected….” (Arendt, 1968: 4).
The Centers for Disease Control and Prevention (CDC) on its part defined
violence as “Injury inflicted by deliberate means”, which includes assault, as well
as “legal intervention, and self-harm”. Other definitions of violence may include
the following:
A situation or event is violent to the extent that a sudde n and drastic increase
occurs in the scale of negative values at stake. The more drastic and rapid the
increase the more the negative, and the more people who experience this
increase, the more violent is the situation or event (Lustick, 2006: 6).
30
CSS 243 Principles of Security Practice and Management
Actions that inflict, threaten, or cause injury. Actions may be corporal, written
or verbal. Injuries may be corporal, psychological, material, or social
(Jackman, 2002: 20).
Exercise
How do you define violence?
Exlusive right of government to the use of violence thesis: There is a great debate
on the issue of justification of violence or violent actions. Some scholars believe
that it is only the government that possesses rights to the application of violence.
According to these theorists or simply members of this school of thought the
essence of a state is to regulate the human conduct for the purpose of maitaining
law and order.
How do you feel if you find yourself in a society, which has no laws or agency to
enforce the laws? There is tendency that there will be breakdown of law and order
if not perpetually but such misnormal is bound to occur occassionally. Even in
places where there are laws and (effective) regulatory agencies, some deviant
members of such societies will still break the laws.
31
CSS 243 Principles of Security Practice and Management
There is doubt that the character of the modern state will definitely
generate conflicts particularly as it relates to control of resources, which demands
great competition. One of the sources of this competition is Population. It was
ppopulation growth that attracted the evolution of agrarian societies into ones that
are more politically organized. People began to accumulate greater information
exchange, which brought about innovations and skills to invent, increasing
resources, as societies began to live beyond agriculture (Christian, 2004: 146–
147). It is against this background that:
On the question of justification of violence, Max Weber argued that the power of
the state include the monopoly on the legitimate use of physical force or violence
within its defined territory. This is to say no government has right to extend its
power beyond its territory, and thus it is illegitimate and criminal to apply force or
violence on the citizens of another country outside your domain. This issue is a
very controversial one considering the power-play among nations in the world
politics, which does not fall within the scope of this lecture (unit).
32
CSS 243 Principles of Security Practice and Management
Owing to the need to guarantee law and order, the state exercises its power by
applying sanctions against lawbreakers or deviant members of the society. The
government fulfills this task by putting in place law enforcement mechanisms
(Police, Customs Service, Immigration Service etc) that ensure strict compliance
of the people to the laws of the land through the use of violence.
Additionally, there are legal systems which contain the rules, regulations and laws
that govern the conduct of each individual and public officer. The laws are
itemized and codified with relevant penalties particularly in penal codes and other
relevant documents of law. The scholars like Max Weber who argue that, it is
only government that has the right to the use of violence also claim that in
anticipation to maintain law and order in a given state, the government has the
power to apply some considerable amount of violence through the use of the
police and military.
Just Application of violence by ind ividu al(s) is Legitimate thesis: There are a
number of scholars and philosophers who believe that it is not only the
government that has right to the legitimate use of violence. The legitimacy of any
violent action is a function of its justification. Take for instance, if somebody is
being attacked by people possessing some dangerous weapons, one thing that will
come to the mind of such person is that the armed attackers should either be
armed robbers or hired killers. Dangerous weapons are neither toys nor pleasant
objects but they are objects of destruction and harm.
Therefore, the person in question will have two options. The first may be to
surrender to fate while the second option will be to resist the attack by fighting
back. If the person chooses the second option, then we arrive at the issue of self-
defence. In someone’s attempt to defend himself against any harm from an
attacker or a group of attackers, he/she kills or injures the attacker(s) or some of
the attackers, has he./she committed an offence for doing so? Or the person
should, in order not to violate the laws, accept to be harmed (or killed) by the
assailants?
Nevertherless, the law allows anybody to apply violence if it is for self defence.
According to the Federal Bureau of Investigation (FBI), homicide can be
classified into two, which include criminal homicide and justifiable homicide
(e.g. self defense).
33
CSS 243 Principles of Security Practice and Management
Another factor that make individual(s) carry out a just violence is if the
government is repressive and does not respect the natural rights of the people. The
people have justification to wage violence against such government because their
natural rights are fundamental to their human existence, and nobody including the
government should deny them such rights.
Additionally, people can also carry-out violence if the government fails to meet
their yearnings, which form the basis of the social contract between them and the
government. But it is always advisable that violence should be the last resort.
People should explore the pacific means in getting government to do their bid.
From all we have discussed so far, it is not only government that enjoy legitimate
use of violence, individual(s) can also enjoy such legitimate right if there is
justification for exhibiting the violent behaviour. The same rule goes to state
(government) because if the state exercises this power in an unjust way, the
people have the power to resist such state or government. Justification of violence
goes beyond the principle of the end justifies the means. This is because if the
means are evil, the end will definitely be evil.
Exercise
Discuss what are the factors that justify act of violence by an individual.
Violent crimes are any aggressive actions which are outlawed or prohibited by the
law. Anybody who engages in any of such actions has committed a serious
offence. Thus such a person shall be punished by the law based on the grativity of
his/her offence. Violent crimes can be classified into two: domestic and non-
domestic. There are many forms of violent crimes and they include the following:
a) Abuse: This involves any action targetted towards wrong or improper use of
another person. There are several types of abuse that can be committed. One of
such is child abuse - unkind and/or brutal treatment of children especially those
under the age of 18 years. Child sexual abuse is another form of abuse
34
CSS 243 Principles of Security Practice and Management
The act of child sexual abuse can also come in form of playing with sexual organ
of the child among others.Emotional abuse is not usually regarded as a criminal
act but it has the tendency to bring the sufferer or victim of such abuse to
aggressive behaviour leading to crime.
We usually hear cases of people harming their love partners because they’re jilted
by their partners. The point we are trying to make is that jilting can cause
emotional abuse but it is not a crime. But the act of jilting can make the victim,
after considering all he/she has done for the partner either in monetary terms etc,
to embark on actions that may be considered criminal.
Sexual abuse is unwanted sexual activity like touching some sentive parts of the
victim. It can also involve subtly compelling the victim into a sexual activity;
b) Assault and Battery: Assualt is a form of violent crime, which involves unlawful
attack aimed at causing bodily injury to another party or person. Battery is illegal
beating that may lead to injuring another person. This is usually evident in most
homes in Africa where parents use objects such as cane and horse-whip to
discipline their children or someone else. Now, let us quickly talk about different
types of assualt. These include aggravated assualt (a form of assault that involves
the use of weapons or violently attacking another person beyond ordinary assualt),
and sexual assault that involves making violent sexual advances on a person;
c) Homicide: This violent crime involves the killing of another person. This criminal
offence is often perpetuated with levity in most of our tertiary institutions in
Nigeria in the name of secret cultism. Many husbands have committed this
violence against their wives, several wives have been reported doing same. This
crime is one of the violent crimes that carry great penalties ranging from long
imprisonment terms, life jail term, to even death penalty;
e) Rape: The offence is also very criminal. It is an unlawful act of engaging another
preson in sexual intercourse through the use of physical force. It is a focible and
unlawful carnal knowledge of a person. The offender can be male or female. It
35
CSS 243 Principles of Security Practice and Management
was in the olden days that men were thought of capable of committing such
offence but now females too can be culprits;
g) Crue lty to : This kind of violent crime is not usually crime per se in Nigeria and
some other places. But in the Western world, animals have a number of rights,
which their governments protect. It is therefore criminal to perpetuate any brutal
act against an animal. So, those who usually hunt birds or stoning another
person’s dog(s) or commit any other form(s) of violence against animals should
be warned to desist if they are visiting or relocating permanently to any part of the
Western world where governments protect the rights of animals. In Africa,
protecting animals rights looks absurd in the face of growing abuse of the
fundamental rights of the people. Human beings never get their protected rights
let alone animals; and
h) Domestic Vio lence: This is form of violent crime in which a person carries out
violence against another person within the same household. This form of violence
is so rampant to the extent that we have at least 30 cases in every minute in
Nigeria and many of which have remained unreported. It is therefore pertinent
that we use a whole unit to discuss it. We shall therefore be focusing on this
subject (domestic violence) in the next unit, so that we can develop an analytical
insight on the subject aimed at providing recommendations through which this
violence can, at least, be reduced if not eradicated completely.
4.0 CONCLUSION
The issue ofviolence has continued to attract growing interest among scholars,
policy-makers as well as human rights advocates. The negative consequences of
violence on mankind has necessitated a quite number of international
organizations and the United Nations to come out with polict frameworks to
address the problem of violence.
36
CSS 243 Principles of Security Practice and Management
Exercise
Explain forms of violent crimes.
5.0 SUMMARY
Third area of discourse on the subject was explaining some of the various forms
of violent crime. I hope that you have found this unit (very) interesting and self-
explanatory? Meanwhile, if you have problem to decipher any segment of this
unit, you are advised to consult your tutorial facilitator or share your problem with
your study group. Thank you for your attention.
Arendt, Hannah (1968), On Violence. New York: Harcourt, Brace & World.
Christian, David (2004), Maps of the Time. Los Angeles, California: University of
California Press.
37
CSS 243 Principles of Security Practice and Management
Peterson, Dale & Richard Wrangham (1997), Males: Apes and the Origins of
Human Violence, Mariner Books.
The Centers for Disease Control and Prevention (CDC). Also avalaible on
.cdc.gov/ncipc/wisqars/nonfatal/definitions.htm#violence. Retrieved on the 20th
April, 2008.
.boston.com/news/world/latinaamerica/articles//2006/09/25/brazil_murder_rate_s
imilar_to_war_zone_data_shows/. Retrieved on 17th of April 2008
38
CSS 243 Principles of Security Practice and Management
39
CSS 243 Principles of Security Practice and Management
Unit 3
DOMESTIC VIOLENCE
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Domestic Violence
3.2 The Cycle of Domestic Violence
3.3 Sources of Domestic Violence
3.4 Solutions to Domestic Violence
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Readings
1.0 INTRODUCTION
The issue of domestic violence has been a subject of great debate. This is as a
result of the way in which various scholars, policy makers as well as institutions
(governmental and non-governmental) have conceptually defined the subject.
There is no doubt that the “patriarchal violence” model has attracted a great
criticisms by conceptualising domestic violence as that one which only produces
male paerpetrator(s) and female victims(s).
Experience has shown that it is not only men that are perpetrators of this violence,
there have been cases where women have been reported to be culprits. Even
within the same-sex households, the situation is not in anyway different. The
subject has attracted a phletora of literature in which several definitions have
emerged in the conceptualization of the term (domestic violence) by scholars,
policy-makers and non-governmental organizations working in the field.
2.0 OBJECTIVES
40
CSS 243 Principles of Security Practice and Management
According to the U.S. Office on the Violence against Women (OVW), domestic
violence can be defined as a:
The Children and Family Court Advisory and Support Service through its
Domestic Violence Assessment Policy described domestic violence as:
Domestic violence has the tendency to keep recurring in homes. This form of
aggression has been experienced, especially those families where the couples and
other members of the households often use offensive or rather abusive language.
In relationships where there is manifest exhibition of abusive behaviour, the
probability that domstic violence will erupt between partners or members of the
household is usually high.
41
CSS 243 Principles of Security Practice and Management
effect on the relationship between the affected parties. Let us consider a situation
where a victim of domestic violence loses one of his/her eyes at the time the
perpetrator exhibits his/her aggressive behaviour against him/her. How do you
think that their relationship will not be affected? Unless, there is geniune
transformation of their conflict relation through the peocesses of healing and
mutual recognition of each other’s need and interest, violence will keep recurring
in their relationship.
Honeymoon Phase
In this phase, there is tension freezing. The atmsphere is rented with affection,
apology, an end to the violence. The perpetrators of the violence usually
demonstrate a sense of regret for the aggressive behaviour exhibited by them
against the victims. But, it is not in all cases that we have parpetrators showing
affection to the victims, as some (perpetrators) will rather leave the scene.
However, it is important to note that, not in all cases that domestic violence is
negative. This is because some couples are deriving pleasure in such abnormal
behaviour. I could remember hearing a lady saying that it was after her husband
battered her that she began to know that the man really loved. To her domestic
violence is a way of showing love and affection. I have the feeling that the lady in
question must have hidden some other vital information, which made her to think
that way.
Nevertheless, I suggest that the husband realized, after the violence, that what he
did was wrong. He therefore apologized to the wife and showered her with love
and affection which climaxed in love-making. The lady might have really enjoyed
the way the husband made love to her that night more than any other time. In
situation like this, there is tendency that the lady will try the repeat of the violent
situation to actually know if the husband will always satisfy her better sexually
under such aggressive condition. If the result of the subsequent incident of
domestic violence is the same with the previous event, I have no doubt, that
domestic violence will become habitual in that kind of family.
42
CSS 243 Principles of Security Practice and Management
In several situations of do mestic violence, the victims might be the ones who
actually started situations, which led to the exhibition of aggressive behaviour by
the culprits. A number of wives are used to nagging and such an act is capable of
producing emotional abuse that tends to activate the other party’s anger. The
anger is likely to produce aggressive or violent behaviour, which the culprit is
likely to direct against the victim.
Acting-out Phase
Exercise
There are many different causes that accounr for domestic violence. In this
segment of the unit, we shall be focusing on these causes. Now, let us discuss the
causes one after the other.
a) Sensit ive Nature of One’s Job: Resulting from the sensitive nature of one’s job,
there is tendency that one’s partner may wish to capitalize on it to make some
extraneous demands from the person. Such demands are most likely to get the
person infuriated. For instance, the wife of a pastor may decide to make a request
from him. And if he fails, the wife can resolve to shout on him, knowing that the
man will like to protect his image, having no other option other than yielding to
her request.
43
CSS 243 Principles of Security Practice and Management
In a situation that the poor pastor decides otherwise, the possibility that tension
will emerge is apparent. If the man becomes angered and can no longer control
his temper, he may have no other option but to use (domestic) violence against the
wife.
Meanwhile, it is not the sensitive nature of one’s job that makes one to perpetuate
violence within the family but a member of the family may wish to capitalize on it
by making inconsiderate demands. It is the reckless attitude of the victim that
would force the culprit to consider aggression against him/her;
Take for instance, the children of homes that frequently experience domestic
violence, there is great possibility that when such children become adults, they
will exhibit some domestic violent behaviour. Again, children that are abused are
very much likely to be violent when they become adults. Some research findings
have also shown that men who frequently abuse their wives have borderline
personalities (between psychotics and neurotics), which they have developed in
their early life (Dutton, D. G. & A. J. Starzomski ,1993: 327-337);
The structure of one’s family can also play a role in his/her acquisition of violent
behaviour. If someone has a misunderstanding some certain (extended) family
member(s) may incite one to perpetuate violence against his/her partner or any
other person in the family. Additionally, if one comes into a family that is violent,
there is tendency that such person will also exhibit violent attitudes when he/she
also has his/her own family;
44
CSS 243 Principles of Security Practice and Management
very likely. This explains why most homes where it is one of the (intimate)
partners is responsible for the family’s needs, often collapse when the bread-
winners begin to experience the problem of dwidling resources.
Research findings have shown that couples that both provide the needs of the
family on equal terms experience less incidence of violence. But the problem of
control and power may likely provoke situation of conflcit in the family, which
can even to abuse (Kurz, 1992).
Here, the man will claim to be the leader of the house. And where the wife thinks
that she can be at the same level with the husband, considering the equal
contribution they make in terms of providing for the needs of the family, there is
likelihood that any good relation between the couple may become severed and
domestic violence may be brought to bear to settle the power tussle between
them;
e) Social Stress: There are so many factors that can cause stress. These may include
inability of someone to pay his/her house-rent, unemployment, loss of job,
childlessness, financial problems, inability of one to meet his/her desired goals,
among others. All these and more can actually lead a person to stress. These
stressors can increase situation of tension in the family.
Though, violence is not caused by stress most times, it can lead some people to
anger (Seltzer & Kalmuss, 1988: 473-491). If one is not able to dispose off the
anger, it can lead to aggressive behaviour. This situation is likely to lead to
transferred aggression. The major environment where transferred aggression often
takes place is the home.
45
CSS 243 Principles of Security Practice and Management
h) Hard Drugs: Hard drugs may include cocaine, heroine, marijuana (weeds), to
mention a few. These are also potential sources of domestic violence. In most
homes where you people taking hard drugs, the situation of domestic violence
will not be far from them. This is because, many times persons taking hard drugs
will find it difficult to have control over their emotions and behaviour.
Exercise
What are the sources of domestic violence?
Police is usually relunctant to facilitate the arrest of the culprits in most cases
except there is a reported case of homicide. May be the reason for that, is the way
society as whole sees domestic violence as normal and private issue. This
partially explains why domestic violence is regarded by the law as a misdemeanor
offence;
c) Apart from attending to the victims, medical professionals should also endeavour
to assist the culprits by providing medical inteventions that will enable the
perpetrators to control their violent behaviour. Application of drugs like
clozapine, Lithium and anticonvulsants can be very helpful to control aggressive
behaviour.
46
CSS 243 Principles of Security Practice and Management
Exercise
What are your recommendations for addressing the problem of domestic
violence?
4.0 CONCLUSION
47
CSS 243 Principles of Security Practice and Management
But domestic violence goes beyond violent behaviour between couple(s), and it
also involves a member of a family aggressing against another person within the
same household. The victim may be a child or cousin or sister (inlaw) or brother
(inlaw) or uncle or aunt or nephew or mother (inlaw) or father (inlaw) to the
perpetrator of a do mestic violence. Woman and girl-child have remained the
greatest victims of domestic violence but this does not mean that we don’t have
female perpetrators of domestic violence. In several households, we can find
women who are husband beaters
5.0 SUMMARY
In this unit, we have tried to discuss a wide range of issues concerning domestic
violence. We bagan our academic task in this unit by looking at some of the
available definitions of the subject (domestic violence). Thereafter, our attention
was drawn to expaining the cycle of domestic violence. We also recognized the
need to discuss the various sources of domestic violence, which we accomplished
in the segment succeeding the one we focused on the cycle of violence. The last
but not the least area of discourse was exploring ways to address the problem of
domestic violence. I really appreciate your attention, and if you have any problem
in deciphering any segment of this unit, please consult your tutorial facilitator.
Thank you and God bless.
Bowen, Erica, Len Brown and Elizabeth Gilchrist (July 2002) , “Evaluating
Probation Based Offender Programmes for Domestic Violence Perpetrators: A
Pro-Feminist Approach”, The Howard Journal of Criminal Justice, 41(3).
Bowker, L.H., Arbitell, M.,& Mcferron, J.R (1988), “On the Relationship
Between Wife Beating and Child Abuse”, in K. Yllo & M. Bograd, Feminist
Perspectives on Wife Abuse, Sage.
Children and Family Court Advisory and Support Service, Domestic Violence
Assessment Policy. Available on
.cafcass.gov.uk/English/publications/consultation/04DecDV%20Policy.pdf
Retrieved on 16th June, 2007.
48
CSS 243 Principles of Security Practice and Management
Goode, William (1971), “Force and Violence in the Family”, Journal of Marriage
and the Family, 33.
Jewkes, Rachel (April 20, 2002), “Intimate Partner Violence: Causes and
Prevention”, The Lancet 359. pp. 1423-1429.
Kurz, D. (1992), “Battering and the Criminal Justice System: A Feminist View”,
in Buzawa, E.S., C.G. Buzawa, Domestic Violence: The Changing Criminal
Justice Response, Auburn House.
Seltzer, Judith A.& Debra Kalmuss (December 1988), “Socialization and Stress
Explanations for Spouse Abuse”. Social Forces 67(2).
Unit 4
49
CSS 243 Principles of Security Practice and Management
THEORIES OF VIOLENCE
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 The Malthusian Theory
3.2 Youth Bulge Theory
3.3 Historical Theories
3.4 Hobbesian Theory
3.5 Rousseauen Theory
3.6 Political Science Theory
3.7 Marxist Theory
3.8 Rationalist Theory
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Readings
1.0 INTRODUCTION
In the discourse of violence, various theories have been presented to explain its
causes. Some scholars are of the view that violence is a subject of nature while
other scholars see it as a function of nurture. The debate on the causes of violence
has generated heated argument among scholars in the fields of criminology,
psychology and other related disciplines. The view that holds that cause of
violence is embedded in nature of man is rather insufficient owing to the fact that
there are some non-natural factors that produce aggressive or violent behaviour in
man. Relying on nurture as the main cause of violence is also inadequate to
explain the cause of violence. One basic truth that has emerged is that there are
many causes of violence, which can be explained by both variables: nature and
nurture. In this unit, various theories of violence shall form the basis of our study.
2.0 OBJECTIVES
50
CSS 243 Principles of Security Practice and Management
Members of this school of thought opinionate that the essence of violence or war
is to decimate or reduce the rising population, such that population outburst can
be prevented with the aim of preventing the available resources from being
overstretched. Malthus maintained that violence or war is of greater function,
which is not intentionally articulated by man due to its invisibility but it is
deliberately engineered by God to check population outburst.
Malthus also argues that the situation of or human aggression or war is beyond
human comprehension and it is also not part of human intentions but a grand
function designed by God to regulate human population. Men, however, are ‘only
puppets manipulated by the transcendent laws of demography, which when
population reached a certain point would pull on the strings of gain and safety,
honour and glory’ (Dawson, 1996: 3).
The theory underscores the necessity of violence or war to adequately address the
problem of population outburst. Counter-factually, in the history of human
population and war, statistics has shown that death rate is far below. The average
death rate is 5% of the population of the warring parties. This theory has been
considered as a subject of intellectual absurdity.
3.2 Youth Bulge Theory
51
CSS 243 Principles of Security Practice and Management
used as a function to reduce the growing population so that food supply will be
adequate to cater for the existing people who are able to survive the war.
On the other hand, Youth Bulge theorists blame human aggression or war
situation on a disparity between the numbers of well educated, well fed, angr y
"fighting age" young males (2nd, 3rd, and 5th sons) and the number of positions
available to them in society as a primary source of violence. The members of this
include Jack Goldstone, Gunnar Heinsohn, and Gary Fuller among others. War is
not basically a function of disproportion in population outburst and the available
(scarce) food per se but the inability of parents to provide for the children who are
of fighting age. Thus according to Huntington (2001):
Generally speaking, the people who go out and kill other people
are males between the ages of 16 and 30.
Youth Bulge theory holds that youth bulge is the main source of war. Youth bulge
arises when 30 to 40 percent of the males of a state are found within the fighting
age of between 15 and 30 years of age. It will follow periods with average birth
rates as high as 4-8 children per woman with a 15-29 year delay. Youthfulness of
the people within this age bracket makes them to easily get angry and violent
when they are unable to meet their expectations like access to medical care,
employment, quality education among others more than other age brackets.
Exercise
Distinguish between the Malthusian theory and Youth Bulge theory.
Though, the US may be having a clandestine motive not declared to the world
public other than the WMD allegation. The war later erupted. It can never be
proven that the war in Iraq is accidental. From available facts, the war was
carefully planned by the US, and so it was intentional. Accidental dimension of
52
CSS 243 Principles of Security Practice and Management
war demands that a hostile situation will just happen without any previous plan in
carrying out such action.
However, one can still argue that war on occasional basis happens purely by
accident. War may sometimes erupt without any previous intention. A good
example was the Biafran War. The Eastern Nigeria or the Federal Military
Government never had any previous intention to go into war in the real sense of it.
The war just erupted when it was least expected.
Hobbesian Theory
In early modern Europe, it was believed that violence was inherent in mankind,
meaning that aggression formed part of human nature. The experience of war in
civilized states is being an offshoot of the wars of savages. This view is expressed
in the Hobbesian theory. This theory is credited to the intellectual artistry of
Thomas Hobbes. What we mean is that this theoretical proposition was
propounded by Hobbes.
These three passions are responsible for the rivalry among men as each tries to
gain relative advantage over the other, which often results in violent hostilities.
The scenario is evident in his state of nature, which was a “state of warre”. This
theory stresses the importance of violence in the maintenance of peace and
security of any state. It is expected of every state to uphold the principle of
defensive violence such that before the enemy carries out its attack, the state
should act fast to undermine the threat or military capability of the enemy. Thus,
the theory advocates for the “principle of first attack” as a secur ity strategy.
Exercise
What is Hobbesian theory?
53
CSS 243 Principles of Security Practice and Management
every man went about his/her normal business and social engagement without
being harassed physically by any other person(s).
The affairs of the people were regulated by ‘golden’ rules and there was peace
among them. Ovid and Seneca: the primitive and natural state was a peaceful
golden age where general good of the people was the order of the day.
Meanwhile, violent hostility and warfare erupted in human social intercourse
when there was rise or introduction of (individual) property acquisition and
inequality.
The rise of property and inequality propelled the situation of war and violence
among men against communal philosophy and absolute pacifism that
characterized the golden age. Rousseau, therefore, concluded that violence is not
inherent in human nature. Man has only cultivated the habit of violence as a result
of the emergence of modern state. The main factor responsible for man’s
inhumanity against fellow man is not located in human nature but in human
nurture.
The members of this school are of the view that military power determines the
relevance of any state in international relations. They also believe that the most
viable way of dealing with state deviance in international relations is through the
use of violence or force.
This school became popular consequent on the eruption of the 2nd world war,
which negated the importance of democratic peace theory in the maintenance of
peace and security. Democratic Peace Theory (DPT) makes us to understand
that democracies don’t engage themselves in violent hostility or war. It (DPT)
advocates for the promotion of democracy and its norms like equality, rule of law
(rather than rule of force), socio-justice, collectivism among others as
fundamental to effective security management.
Political realism argues that there is no way states will absolutely uphold the
principle of collectivism due to the individualistic nature of state behaviour in
international relations. Thus, national interest plays a prominent role in the action
of any state within international environment. Consequently, there is no “born-
againism” in international relations. Every nation places more priority on
achieving its self interest above global interest.
54
CSS 243 Principles of Security Practice and Management
This view is one of the sources of militarism and arms struggle in the post World
War II global environment where the use of violence has become very attractive
in the relations among states. Therefore, military capability and mobility as well
technological advancement of a state basically determine its influence and
relevance in international relations. Military power is more important than any
other form of power (i.e. economic power etc).
Again, power transition theory reminds us of the (important) roles that economic
resources play in power transition. This is because there is tendency for a state to
move to a greater level when it experiences economic growth. Hence, the
economically weak state cannot fulfill its adventure very well in power transition.
Thus, economic growth can lead a state to aggressive behaviour.
Another major school is cyclical theory of war. This school is of the opinion that
violence is not necessary but absolutely inevitable. Every century produces World
Power, which monopolizes military power and viable economic base to maintain
its hegemony. No hegemonic power can retain its power status for more than four
decades. The emergent challenger will come on stage, and in the process of well
articulated aggression policy, the delegitimatization and redistribution of the
existing system power may become manifest.
However, the challenger may eventually become the dominant power and the
cyclical process emerges again till its displacement by another power (country).
This school also argues that there will always be eruption of violence despite the
presence of any (long) period of peace due to the behaviour of states in
international relations. This is because weak nation(s) would like to displace the
strong one(s) to enjoy hegemony.
Exercise
What are the schools of thought in Political Science theory?
The Marxist theory of violence is of the view that violence is a function of class
struggle. It sees violence as imperial instrument to increase the power of the
ruling class and divide the proletariat of the world through divide and rule
strategy, causing confusion and enmity among them (proletariat).
55
CSS 243 Principles of Security Practice and Management
The dominant powers use deceptive formula such as religion, nationalism, among
others to continue in enjoying their hegemony over the proletariat world public, to
prevent any anticipated challenge by the latter, undermining any solidarity among
the proletariat. Violence is a natural consequence of the free market and class
system, and will not disappear until a world revolution takes place.
Rationalist theory argues that perpetrators of aggression are rational. Here, the
aggressor uses violence as a platform to meet his goals. Therefore, each party that
engages in violence tries as much as possible to minimize the loss of life and
property in its own camp while trying hard to outsmart the other party in
achieving the best outcome for itself.
The rationalist theory presents three reasons why some states cannot take solace
in bargaining or diplomatic settlement but to resort to violence. These reasons
may include issue-indivisibility, information asymmetry with incentive to
deceive, and the inability to make credible commitments (Fearon, 1995: 379-
414).
The issue of indivisibility arises when parties in conflict fail to prevent their
conflict relation from degenerating into violence. They will fail to adopt
diplomatic bargaining because the thing, over which they are struggling with each
other, cannot be shared between them. In this case, it is one of the parties that can
have control of the object(s) of conflict. In Nigerian societies and elsewhere, if
there is conflict between two men over a woman, the custom will have that it is
only one of them that can eventually have the woman.
56
CSS 243 Principles of Security Practice and Management
In international arena, each of these parties believes that through the military
secrets of its capabilities and the need to maintain such secrecy, it is unnecessary
to adopt bargaining. This is because such diplomatic bargaining is capable of
exposing its military strength to the enemy.
Nonetheless, the enemy party can capitalize on the situation, if it appears that she
enjoys strategic advantage over the other party. Sometimes, a state may call up a
large number of its civilian population and dress them like normal and regular
soldiers when a potential enemy state representative is visiting her. During the
visit, the perceived enemy state representative may be requested to see her
standing army (with overwhelming population) not for any other reason(s) but to
deceive the other party about the size of its army. Seeing a large number of
regular soldiers may make the enemy party to concede.
The inability of a state to make bargaining may fail due to the states' inability to
create credible commitments. During a process of bargaining, one of the parties is
likely to feel that it is not getting enough from the diplomatic process. If the
attitude of great commitment to mutual recognition of interest and need is not
reinforced in the peace process among the parties, the one with strong bargaining
capability may likely consider its diplomatic advantage as an incentive to take
undue advantage over the other party, even in the nearest future.
This kind of attitude is capable of germinating violence among the parties because
the party with weak bargaining power may decide to adopt violent means to settle
their conflict especially when it discovers that it also enjoys military advantage
over the other party.
Exercise
Explain the Marxist and Rationalist theories of violence.
4.0 CONCLUSION
5.0 SUMMARY
57
CSS 243 Principles of Security Practice and Management
Slomp, Gabriella (1990), “Hobbes, Thucydides and the Three Greatest Things”,
History of Political Thought, 11.
58
CSS 243 Principles of Security Practice and Management
59
CSS 243 Principles of Security Practice and Management
Unit 5
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Marxist Theory
3.2 Environmentalist Theory
3.3 Realism
3.4 Social Democratic Positivism
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
The experience of the world the end of World War II has shown that incidence of
crime has been on the increase. Even those countries that initially experienced
very low rate of crime have become plagued with crime. Every-time, new forms
of criminal behaviour are emerging.
This situation has really undermined the efficacy of the traditional deterrence and
coercive techniques of crime control. The criminal justice system has begun to
undergo some reforms in several countries in an attempt to fine-tune it to meet the
challenges of modern time as relates to crime control.
According to Garland, no less than 2 million people are in prison in the United
States while in this same country at least two condemned prisoners are executions
on weekly basis. The dynamics of crime have necessitated proliferation of
intellectual inquiries and a plethora of literature on the subject of crime control. A
number of theories have been developed to address the problem of crime and
recommend measures that can be adopted in crime control. In this unit, we shall
be exploring some of the theories. Thank you for
2.0 OBJECTIVES
60
CSS 243 Principles of Security Practice and Management
This is one of the theories of crime control. The theory describes the causal
relationships between society and crime. According to this theory, the source of
crime can be traced to the introduction of private ownership of property in the
evolution of state.
The members of this school of thought are of the view that the disrupt ive
character of industrialized societies can be said to be responsible for criminal
behaviour. The state is stratified where people belong to one class or another
based on their position in the equilibrium of power, wealth and prestige.
Therefore, it is the class that controls the mode of production that will determine
not only the economy and polity but also the law that regulates the conduct of the
people in a given society. This view is nonetheless shared by Chambliss (1971:
3), and according to him:
The Marxist theory further holds that capitalist contradictions have forced
majority (proletariat) into structural relegation. This situation has created
conditions, which have hitherto given rise to a climate of crime and criminality in
the society. Willem Bonger also believes that it is the class system that
characterizes the modern state that is responsible for criminal behaviour.
Bonger drew a nexus between crime and economic and social conditions. He
however argued that crime is social in foundation and an actual reaction to the
existing cultural order. The primitive societies discouraged the habits of
selfishness while the relationship among the people were guided by altrustic ethos
in where selflessness was the order of the day.
61
CSS 243 Principles of Security Practice and Management
But when societies began to move beyond agrarian production, the improved
exchange of information gave birth to growing technology and people started
producing for commercial purposes. This situation led to the introduction of
private property ownership.
Then, modern state emerged to reinforce the selfish motives, which casualize the
criminal subjugation of the majority by the few economically and politically. This
school of thought affirms that it is the socio-economic deprivation suffered by the
majority and the attempt by them to address the structural inequality that explain
the acts that the state regards as criminal. The poor would engage in crime out of
frustration and perceived injustice.
Nevertheless, the modern state enables the rich to control the power and they are
the ones who also have the right to impose punishment for any acts they consider
as criminal. On the issue of stealing, such a criminal act if perputated by the poor,
it attracts more noise but if committed by the rich, it carries little or no noise.
However, the theory concludes that control of crime can only be facilitated if the
state assumes the exclusive control of the means of production and ensure the
enthronement of a classless society. There should be socio-economic justice
among the people such that no one will feel a sense of deprivation. It is only when
these are put in place that the state will be able to address the problem of crime.
Exercise
What is theory Marxist theory of crime control?
This theory opines that crime control can be carried out through the application of
large pin maps to illustrates the areas where crimes occurred. The art of mapping
and analysis of crime has reached a new stage, resulting from the emergent
information revolut ion. Therefore, there are computerized mapping systems,
which police and the scholars working in the area of criminology can use to
appreciate the dynamics of crime in a given place.
62
CSS 243 Principles of Security Practice and Management
This theory underscores the importance of using the character of any environment
in strudying its pattern of crime. This theory is also of the view that
environmental factors are always taken into consideration before anybody can
take to crime. According to Bartol and Bartol (2006), geographic profiling is
based on the notion that perpetrators of crime often consider environmental
factors in their decision to commit crime, and they will prefer to do so in the
societies that are environmentally vulnerable.
In the control of crime, the environmentalist theorists argue that a great practical
application must be put in place such as Crime Prevention through Environmental
Design (CPTED). This theory holds that environmental situations like poor
lighting, high presence of uncompeted buildings, overgrown bushes, poor space
management among others account majorly for crime incidents in any given
society.
Exercise
Explain the environment theory of crime control.
3.3 Realism
But according to the realist theory, the best way to control crime is to examine the
nature of the crime, the conditions that produce such crimes as well as the impact
of the crimes. Therefore, the effective way to control crime in any society is to
ensure that the control measures which are being provided can respond effectively
to the nature of crime.
Exercise
Discuss realist theory of crime control.
This is a form of positivist theory, which blames incidence of crime and acts of
criminality on (socio) injustice. The main source(s) of criminal behaviour cannot
63
CSS 243 Principles of Security Practice and Management
The main source of crime, according to this theory, is unjust and unfair
distribut ion of wealth in the society. In societies laws are made and deterrence
measures are put in place to discourage people from engaging in acts considered
to be criminal. Yet, sanctions and punishment have appeared to be ineffective in
the control of crime in most societies.
However, people conform to the norms and rules (laws) of their societies based on
how they see justice in the distribution of wealth, such that no section of the
society(ies) is deprived economically. But, if there is a sense of relative
deprivation by any segment of the society, there is tendency for the perpetuation
of crime(s) by those who are deprived.
There is general consensus on the causality between the conditions one faces and
his/her resolve to commit crime. Unfavourable and poor situations can force one
into acts of crime.
There is a general belief that crime cannot be controlled if the conditions that
make people to engage in crime in the first instance, are not changed. It is
however unethical to sanction offenders of crime without addressing the
conditions, which lead them into perpetuation of acts considered to be criminal.
This task of juxtaposing the circumstances and crime is hardly accomplished in
developing countries like Nigeria.
There is no doubt that many of the people going into crime are victims of
circumstances, with conditions that are beyond their control. How do you feel, if
as a graduate, you have remained jobless for more than five years and the people
who have less qualifications are economically favoured just because they have
some godfathers or godmothers somewhere?
The pauperization of workers in Nigeria is one of the reasons why corruption and
other fraudulent practices are on the increase among the workers. The structural
injustice that characterizes wage system in the country is a veritable source of
crime. Just consider a situation where two friends attended the same university,
having the same qualification and class of degree in the same course, but
incidentally in seeking for employment, one of them is employed in an oil
company, and after a long search the other friend only manages to secure job in
64
CSS 243 Principles of Security Practice and Management
the civil service. The person working in an oil company earns more than 5 times
of what is being earned by the other friend. They both go to the same market to
purchase their food items and other daily needs.
Considering the foregoing scenario, you may agree with me that the other friend
working in the civil service may have two options: resign to fate or look for
alternatives (often through corrupt practices) so that he/she can meet his needs.
There is no doubt that wage system in Nigeria and monetization culture that exists
among the people coupled with the problem of high unemployment, and endemic
corruption and stealing among the ruling elites in the country, can be attributed to
be major sources of growing rate of crime in Nigeria.
The dimension that the situation of crime has reached constitutes a great security
threat to the nation at large. In attempts to survive, even at marginal level, people
seek for a lot of means most of which are criminal or criminal tendencies. We
now hear strange news like parents selling their children to human traffickers or
ritualists to meet their basic needs. Cyber-crime has become a fancy among large
segment of the public. Commercial prostitution has been on the increase with
social and health implications, for example the HIV-AIDS pandemics.
Again, bank robbery, kidnapping and other terrorist acts have become
phenomenal in recent time. Criminalization of the police and other law
enforcement agencies appears very evident. The coercive deterrence has failed to
control the growing crime rate in Nigeria and elsewhere.
Nonetheless, this theory holds that rather than focusing on how to mete out
punishment or sanctions on offenders of crime, our attention should center on the
conditions that bring about a person’s resolve to take to crime. In countries like
Nigeria, a major reason why people take to crime is inequitable distribution of
state wealth where the ruling elites and their cronies who constitute less than 10%
of the entire population allocate to themselves more than 85% of the national
resources. The middle class is obliterated in Nigerian society. Therefore, we only
have upper and lower classes of people such that the richer get richer while the
poor get poorer.
Moreover, the supporters of this theory are of the view that focusing on the
offender of crime and coercive deterrence cannot adequately control incidence of
crime in any society. Therefore, our attention should be geared towards changing
the conditions that actually force people into crime. In Nigeria, the socio-
economic conditions of the people must be improved through provision of social
security, employment opportunities and fair wage system.
Above all, there should be value orientation; the society should go beyond the
present monetization culture. Man should be honoured not according to how
much he/she has but based on his/her community development efforts, integrity,
honesty, hard work, and contribution to knowledge. In managing the nation’s
65
CSS 243 Principles of Security Practice and Management
security, law enforcement agencies only need minor coercion to control crime
among the people, if there is fair distribution of state wealth.
Exercise
Discuss social democratic positivist theory of crime control.
4.0 CONCLUSION
On the other hand, the business of crime control goes beyond the domain of the
state. It involves partnership between the state and the people. This view partly
explains the holistic approach that many countries are now adopting in the control
of crime in their doorsteps. The policy of state as it relates to crime control is one
way or the other informed by theoretical connectivities.
5.0 SUMMARY
In this unit, we have been able to explore a number of the existing theories of
crime control. The theory we focused on was Marxist theory. Thereafter, we
discussed environmentalist theory of crime. Other theories we explained in this
unit include realist and social democratic positivist theories. You are hereby
advised to source for other theories of crime control not discussed in this study.
You can get a number of literature that deal with various theories of crime control
to widen your knowledge of crime control. Thank you for your patience and
attention.
66
CSS 243 Principles of Security Practice and Management
Chambliss, William J. & Mankoff, Milton (eds.) (1976), Whose Law? What
Order? A Conflict Approach to Criminology, New York: John Wiley.
Chambliss, W & Seidman, R. (1971), Law, Order, and Power. Reading, Mass:
Addison-Wesley.
Unit 1
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Approaches to security Management
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
67
CSS 243 Principles of Security Practice and Management
Rather than the traditional insecur ity that pervaded the relations among nations in
the cold war era, most states are now plagued with international armed struggle
and organized crime such as terrorism by non-state actors. In Nigeria, armed
robbers in the olden days usually carried out their nefarious activities in the
middle of the night. But nowadays, the men of the world do not only rob their
victims in broad day light, but they have also extended the coverage area (for their
operations) to police stations and several other government institutions. This
situation has however posed some intellectual questions and policy concerns
about the efficacy of various approaches to security management. In this unit, we
shall be exploring various theoretical approaches to security management.
2.0 OBJECTIVES
The members of this school hold that security can best be managed if government
at all levels (from local to world) ensure that a security system ‘based on
development of civic culture on inter(national) agreements and treaties, stress on
68
CSS 243 Principles of Security Practice and Management
Meanwhile, the emergence of World War II had undermined the relevance of this
approach in the management of international security particularly as it concerned
the issues of democratic order. The experience of the world population has not
only shown that democracy could not guarantee peace and security but some
democracies can carryout offensive capable of jeopardizing national and
international (security;.
However, in the attempt to managing national security every country has begun to
invest in the purchase of weapons to resist not only external security threats but
also internal aggression. In this case, coercive power and military force play
fundamental roles in the management of security. They will ensure compliance of
state and non – state actors to the laws in the maintenance of world security.
Also, in the management of internal security, state should ensure that its
legitimate use of violence is reinforced by adequate military capability and
mobility. This situation tends to lead to rapidly growing military expenditure.
The amount of military hardware and personnel according to this approach, will
determine how secure a nation will be. Realist model, therefore, led to arms race,
in which states drastically increased their military expenditure in the defence of
national sovereignty.
In developing countries, increase military budget has created internal tension and
structural violence in which the local people have often lacked basic necessities,
making them to survive marginally. On the African continent, this problem has
attracted deepening political crisis, military coups and counter-coups, inter-ethnic
violence, religious bestiality among others.
The bottom line is that, rather than accumulating military wares for the protection
of their various countries against the attacks from external forces, most
69
CSS 243 Principles of Security Practice and Management
governments in developing countries use the arms against their own citizens for
variety of reasons. Some of the reasons may include tenure elongation, racial
discrimination, ethnic rivalry, religious chauvinism etc. One good example was
the application of hydrogen gas chemical weapon against some of its own citizens
by the government of Saddam Hussein where several innocent civilians including
women and children were killed.
The violence experienced in Rwanda and Burundi made Africa a true reflection of
Hobbesian state of nature. The madness that pervaded Hutus–Tutsi rivalry was
monumental with high degree of bestiality. The violence was a nightmare!
Since the end of cold war, the world has recorded more internal armed conflicts
than international wars or aggressions, making it necessary to seek for another
approach that can address the problem of increasing local insurgency in Africa
and elsewhere;
(c) Pluralism: Pluralist approach emerged in the 1960s. This approach was a
departure from the state-centered security system that dominated the world system
during the early cold war era. Pluralists articulated that balance of power, a key
element of realism had not only failed to protect human race against insecurity but
it had also aggravated pains that accompanied such insecurity.
The world began to experience a security dilemma resulting from the emergent
danger posed by the politics of balance of terror where proliferation of weapons
has become the order of the day. This approach explains why regional and world
organizations have mandated their various agencies to carry-out programmes that
can influence international security policies, which may affect the self-interest of
some (member) nations. This will bring us to the question of which national
interest policies are internationally moral? Pluralists admonish states to
discountenance any of their self interest policies that are considered to be immoral
or capable of undermining international security;
(d) Marxism: This approach became popular in security studies in the 1970s.
According to this approach, economic factors and struggle for the control of state
resources are the bases for security relations among states. Within the structure,
the struggle for the control of means of production can lead to violent conflict
situation between the proletariat and bourgeois.
Marxist approach therefore, opines that the state should control the economy and
abolish private ownership of property and every individual should be catered for
70
CSS 243 Principles of Security Practice and Management
according to his/her needs. If the state unilaterally controls the economy, selfish
pursuits, which form the larger security threat, must have been addressed. The
issue of selfish accumulation of wealth would not arise if private ownership of
property is discouraged. The crimes and threats that crop-up through struggle for
the control of resources would have been eliminated, if no individual is allowed to
own a property.
Nevertheless, struggle for the control of the state resources by individual actors
tends to generate tension in the polity and those who perceive exclusion can resort
to violence and other forms of criminality like armed robbery, terrorism, and
insurgency. Weak nations or developing countries appear to be most palpable
victims of such structural tension.
In the process, the insurgents engage government forces in armed struggle and in
replenishing their armoury, insurgents and government often use valuable
resources (they are fighting over) in the purchase of weapons, most of which
come from developed. In this case, powerful nations derive enormous economic
benefits from such situations of violence and insecurity in the weak states.
State actors have now realized the need to pursue regional interest, even above
their own national interests. This approach underscores the emerging interest
nations are having towards collective security. This has created a new
understanding in security relations among states. State actors have begun to show
deep concern in the spill-over effect(s) of any insecurity in their neighbouring
countries, on their own internal security. One of the reasons why Nigeria
intervened and ensured the resolution of the armed conflicts in the region, i.e.
Liberian and Sierra Leonean crises, was the negative impact those violent
conflicts would have on her internal security.
The civil wars that plagued Sierra Leone and Liberia generated large amount of
refugees in the sub-region, and Nigeria was one of the host countries, that
accommodated those refugees. Many of the refugees hosted by Nigeria were not
properly disarmed. Some of them came in with arms, which found their way into
the hands of some local criminals, who used the weapons to further terrorize the
nations. This situation has posed a great security threat to the nation.
Apart from the weapons exchanged for money, some of the refugees joined some
local criminal gangs to engage in armed robbery and other violent crimes,
constituting a threat to national security. The experience of the countries in the
71
CSS 243 Principles of Security Practice and Management
Great Lakes was horrendous as the region did not only generate the highest flow
of refugees, but armed conflict also became an infectious disease that plagued a
great number of countries in that region.
By and large, nations now appreciate taking regional approach in the management
of their internal security. This is as a result of the (negative) impact that
breakdown of order or insecurity in a country can have on its neighbouring
countries. It is against this back-drop that countries sometimes sacrifice their
national interests for regional interest. It is on record that the rising wave of crime
and insurgency in Nigeria can be blamed largely on maladministration, but the
upsurge of political strife in Liberia played a part in the security dilemma that
Nigeria has since been experiencing;
(f) Human Security: There is no doubt, that the decade preceding the year
2000 witnessed a lot of contradictions and negativities in terms of war, which
posed a great threat to national and international security. The spread of HIV-
AIDS was rapid during this period. Global warming has emerged as a
cankerworm ready to destroy the human race, and volcanic nationalism that
greeted post-cold war era has become a major source of state collapse. The
subject of legitimate use of violence by the state has attracted a great debate,
especially as we consider the unjustifiability in the exercise of power by some
governments.
By the 1990s, the attention of the world population has shifted to redefining
security and look for the best approach that can guarantee effective security
management, different from the traditional ones that have failed to address the
increasing security threats. The search for the best approach led to the emergence
of the term human security.
This approach advocates for a paradigm shift. Rather than allowing the state to
continue to define security, people who make up the state should be the ones to
define their own security. Therefore, it is not the function of the state (or
government) to determine security imperatives for the people; it is the people who
decide their own security.
72
CSS 243 Principles of Security Practice and Management
So, the state traditional security measures of coercion and deterrence are
moribund or outdated. Hence, policy-makers in several countries have adopted
this approach as the guiding principle of their security laws. The consensus of
state and non-state actors is now geared towards appreciating “any security issues,
including without limitation those of a political, strategic, economic, social, or
ecological nature” (Vale, 1992: 100).
The concept of security has for too long been interpreted narrowly: as
security of territory from external aggression, or as protection of national
interests in foreign policy or as global security from the threat of a nuclear
holocaust. It has been related more to nation-state than people…..forgotten
were the legitimate concerns of ordinary people….for many of them,
security symbolized protection from the threat of disease, hunger,
unemployment, crime, social conflict, political repression, and
environmental hazards (see UNDP Human Development Report, 1994:
22).
Since 1990s, this approach has not only become the priciest bride among the state
actors but several non-state actors including the Non Governmental Organizations
(NGOs) that have acted spontaneously in the popularization of human security as
an approach to security. One of the leading NGOs advocating for the global
adoption of this approach is the Human Security Network. The organization has
been championing the need to “energize political processes aimed at preventing or
solving conflicts and promoting peace and development” (see
.humansecur itynetwork.org/network-e.php).
It is no news that several nations have articulated the relevance of human security
approach in the formulation of their security policies. For example, in South
Africa defined its national security in its “White Paper on Defence”, which was
published in 1996. It states that:
73
CSS 243 Principles of Security Practice and Management
Similarly, Canada has also incorporated human security approach into its foreign
policy formulation process(es). The country has redefined the concept of security
from the traditional one to that which guarantees “safety for people from both
violent and non-violent threats…..characterized by freedom from pervasive
threats to people’s rights, their safety, or even their lives” (Department of Foreign
Affairs, Canada, 1999: 5). The country has also backed its new commitment,
expending huge national resources in the promotion of human security worldwide
especially in form of aids (see .humansecurity.gc.ca).
Exercise
Explain approaches to security management.
4.0 CONCLUSION
Before the collapse of the Berlin Wall, scholars and practitioners in security had
been confronted with problem of identifying which of the available approaches
was the best in the management of security nationally and internationally.
Basically, various traditional approaches have focused exclusively on the secur ity
relations among state actors, relegating the relevance of individual people in
security affairs. The traditional coercion and deterrence techniques are becoming
moribund and ineffective in security management.
Non-state actors are becoming more visible in national and international theatres
of violence, such that some individuals or groups have become more powerful
than the state. A good example is Hezbollah (militant group) that is considered in
several quarters as more powerful than the government of Lebanon. One of the
reasons is that its (Hezbollah’s) membership extends beyond Lebanon. It
members scatter across and beyond the whole Middle East.
Al-Queda taught the whole world that commercial planes could be used as the
weapon of mass destruction as in the 9/11 incident where thousands of people
were massacred by crashing planes at the World Trade Centre and the Pentagon.
There is need for world governments to adopt the new non-traditional approach,
human security to address the structural security threats that bedevil most
countries in the world.
74
CSS 243 Principles of Security Practice and Management
On the question of, if Nigeria will soon join the league of countries having human
security as the foundation of their security agenda, it is only times that will tell. It
is only time that will tell, if the country will move beyond its traditional AK-47
coercion and deterrence approach, which is state-centric. Human security
approach is most effective approach to security management. Apart from other
reasons, it allows people to deliberate and decide their own security matters.
5.0 SUMMARY
In this unit, our focus has been on various approaches to security management.
The first five are traditional approaches while the last approach is non-traditional,
which advocates for paradigm shift in security management. Human security
advocates for ‘peopling’ of security in which the people define security matters
rather than the state.
The writer will wish to remind you that there are other non-traditional approaches,
which are not covered in this unit. You are hereby advised to search for other non-
traditional approaches to security management in the library or on the internet.
Did you find this unit interesting? If yes, bravo! And in case you have difficulty in
understanding any segment of this unit, please contact your tutorial facilitator or
other student(s) in your study group. Good luck.
75
CSS 243 Principles of Security Practice and Management
Morgenthau, Hans (1976), Politics Among Nations: The Struggle for Power and
Peace, 5th Edition, Alfred A. Knopf.
76
CSS 243 Principles of Security Practice and Management
Unit 2
MEANING OF INTELLIGENCE
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Intelligence
3.2 Dimensions of Intelligence
3.3 Categories of Intelligence
3.4 Sources of Intelligence
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
The experience of the world since World War II has shown that security
management is a very serious business. It is no surprising that the security sectors
both nationally and internationally have undergone a number of reforms aimed at
addressing security challenges and threats that bedevil the world population.
There is no doubt that one of the security areas or fields receiving rapidly growing
interest and attention, not only among the security practitioners, but also the
academics and policy makers, is intelligence.
Nonetheless, intelligence has become one of the key elements of security sector
reform. This explains why state and non – state actors currently invest huge
amount of resources both in human and material terms on intelligence owing to
the strategic roles it plays on (effective) security management in public and
private environments.
2.0 OBJECTIVES
77
CSS 243 Principles of Security Practice and Management
The term intelligence is often mistaken for information or data. This is because
most people (or simply the laymen) usually describe it to mean information. Well,
the truth of the matter is that intelligence is different from (ordinary) information
but it is a form of information, which has been ingrained with added value
through analytical and evaluative instrumentation. Intelligence is a refined,
analysed and evaluated information or data gathered through either overt (open)
or clandestine (secret) means or both.
Intelligence ------ is not only about spies and satellites. Intelligence is about
the thousands and thousands of routing everyday observations and activities.
Surveillance, interactions – each of which may be taken in isolation as not a
particular meaningful piece of information, but when fused together, gives
us a sense of the pattern and the flow……….. ( .Fas.org/sgp/crs/Intell/RL
33616.pdf).
78
CSS 243 Principles of Security Practice and Management
Intelligence can also be described as what a ‘state must possess regarding other
states in order to assure itself that its cause will not suffer nor its undertakings fail
because its statesmen and soldiers plan and act in ignorance (Kent, 1966: 3).
Additionally, according to Wilson (2004; 5) the term intelligence denotes:
Intelligence has not only become a key element of security management but also
the heartbeat of security in modern time. This is because its impact on security
cannot be under-estimated. In the next segment of this unit we shall be looking at
the various dimension of intelligence.
Exercise
How do you define intelligence?
During this process, values are added to information which make it (information)
refined “into a usable form for decision makers” (Hannah et al, 2005: IV). There
is no doubt that, it is often said that “the relationship between processes and
structure … determines the successful outcome of the intelligence activity” (Ibid);
79
CSS 243 Principles of Security Practice and Management
(b) Intelligence a structure: This is all about the agency or agencies and
institution(s) charged with the responsibility of intelligence sourcing for consumer
i.e. the government. The institutions (often referred to as intelligence services), in
carrying out their intelligence activities, are influenced by a number of factors.
According to Hannah et al, 2005: iv), these factors may include:
• The roles and mandates adopted by one or more services (i.e. are there different
agencies for both the domestic and foreign role?) – as well as understanding
overlaps between intelligence agencies and other players (such as law
enforcement) in the security community;
• The need to ensure central control and coordination of and accountability for, the
intelligence community; and
As you may be aware, there are several overlapping aspects, or rather types of
intelligence such as security intelligence, domestic intelligence, military
intelligence, to mention a few, which according to each nation, maybe separated
by delegating different agencies with different categories of intelligence. In this
case, each intelligence agency will be tasked with a category of intelligence. In
Nigeria, the intelligence unit of the Nigeria Police is mandated by the law to carry
out home security intelligence while the Directorate of Military Intelligence
(DMI) performs the task of providing military and strategic intelligence.
On the other hand, there are countries where there exists only one intelligence
agency, which performs all intelligence activities ranging from domestic to
foreign, at the same time. A good example was the KGB in the defunct Soviet
Union. A caution has to be exercised here, and this is because having one
intelligence service or agency performing all intelligence functions does not
always mean that there exists only one intelligence service. The number of
available intelligence services varies from country to country.
80
CSS 243 Principles of Security Practice and Management
For instance, in the United States, in practical terms, there are several intelligence
outfits or agencies that perform various intelligence functions but the Central
Intelligence Agency (CIA) performs all functions ranging from do mestic,
paramilitary to foreign intelligence.
Exercise
Discuss the dimensions of intelligence
There are several categories of intelligence and these include the following:
81
CSS 243 Principles of Security Practice and Management
In fact, lack of adequate criminal intelligence has been a great challenge to the
prosecution of criminal suspects in Nigeria. It is a shame that the Nigeria police
and State Security Service (SSS) have failed to bring any of the perpetrators of
political assassination which the country has recorded in the last eight years to
book. Several suspects have been prosecuted in court(s) but nobody has been
indicted, since there is no sufficient criminal intelligence to nail the perpetrators.
82
CSS 243 Principles of Security Practice and Management
It’s on the basis of the strategic intelligence outcome that the policy and decision
makers will resolve on which programme(s) to adopt. Net assessment can be
adequately conducted by any country or party, if there is strategic intelligence,
which will help decision-makers to take into account fundamental uncertainties
about the future. I know that many of us may be wondering and seeking to know
what net-assessment is all about. Well, net assessment involves developing an
analytical framework that takes into account the strategic goals, doctrines,
operational concepts and strategic military capabilities of competing countries,
alliances as well as several other international actors.
Exercise
List and discuss any five categories of intelligence.
Exercise
Highlight any five sources of intelligence
4.0 CONCLUSION
83
CSS 243 Principles of Security Practice and Management
Intelligence has remained crucial in security management. Since the end of World
War II, intelligence has assumed a new dimension, and it has formed the large
part of strategic planning and securitization agenda of the world powers
particularly as it relates to prevailing ideological polarity. Providing adequate and
effective intelligence can assist an organisation or country with a wide range of
opportunities, including assessing the risk and threats and they can undermine the
internal security of that organisation or country. Due to the strategic importance
of intelligence, it is quite paramount for services to conduct regular intelligence
reform to meet the challenges of modern security sector.
5.0 SUMMARY
In this unit, we have focused on the meaning of intelligence. We began the study
by defining the term intelligence. Therefore, we discussed the various dimensions
of intelligence. In the following segment, our analytical compass was drawn on
explaining categories of intelligence. The fourth subject of discourse was
highlighting the sources of intelligence. Thank you for your attention. I strongly
believe that you’ve found this unit very interesting too. But if you have problem
understanding any segment or the whole of this unit, feel free to consult your
tutorial facilitator who will help to illuminate on areas of difficulty, if there are
any.
Hannah, Greg et al (2005), Intelligence for security Legislation for Security sector
Reform, RAND.
84
CSS 243 Principles of Security Practice and Management
Unit 3
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Intelligence Collection
3.2 Disciplines of Intelligence Collection
3.3 Means of Intelligence Collection
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
85
CSS 243 Principles of Security Practice and Management
2.0 OBJECTIVES
Information is very crucial to carrying out intelligence tasks. This means that the
art of collection of information must first be considered, in intelligence business.
Then, what is intelligence collection? It can defined as “the procurement of
information believed to be pertinent to decision-maker (sometime referred to as
‘raw’ intelligence data)” (Hannah et al, 2005:1)
86
CSS 243 Principles of Security Practice and Management
- Imagery Intelligence (IMINT): This involves the use of satellite images for
the collection of intelligence. It is a method of collecting information through the
use of snapshots to provide security; and
87
CSS 243 Principles of Security Practice and Management
Marl Lowenthal, in his work, Intelligence: from Secrets to policy, argued that
“Despite the fact that OSINT has always been used, it remains undervalued by
significant segments of the intelligence community”.
Exercise
Explain the disciplines of intelligence.
88
CSS 243 Principles of Security Practice and Management
Agent: Agents are also known as assets. They are spies who gather information.
They are involved in all sorts of clandestine reporting, sipping (or stealing), and
illegitimately breaking into the information (systems) of their target parties, i.e.
nations, business organizations, security agencies among others;
Case Officers: The business of spying is structured in a cell form. Spies are
grouped in small units, and spies can only know other spies in their cell(s) or
unit(s). it is the case officer who recruits his/her own spies. He/she must
demonstrate some level of competence, understanding and professional matur ity.
He/she must also be a good team coach, having mentoring potentials to be role
model to the spies or agents working under him/her and
Courier: Couriers are suppo rt personnel who assist the spies in managing their
clandestine communication by securing them (the communications) against
enemy’s interceptions or detection;
(b) Black bag operations: These are clandestine or secret) ways of making
(illegitimate) entry into the information facility (ies) of any target party for
intelligence purpose(s). the methods may include lockpicking, safecracking,
finger-printing, electronic surveillance, mail manipulation, forgery among others.
:
89
CSS 243 Principles of Security Practice and Management
- Reid: This technique involve interrogators watching the body language of the
person(s) (or suspects) being interrogated. This method is questionable because it
is (very) difficulty to read the mind of man through his/her face or the so called
body language;
(d) Number Stations: These are (covert) short wave radio stations. The
voices that are heard on these stations are often created mechanically in various
languages. The voices on the radio can be generated to represent or look like
those of women or men as well as adult or children. Number stations are used to
pass instructions or messages to spies or used to deceive the public or the
government (management) of the target countries (organizations);
(e) A One-Way Voice Link (OWVL): It’s another form of shortwave radio
in which transmission is targeted towards aiding communication flow between the
spies or agents working on the field and their respective intelligence agencies
(employers). This system allows the spies to transmit already recorded message
without having to stay on air for so long;
(f) Steganography: The term steganography emanated from the Greek word,
meaning “covered or hidden”. This technique that involves sending information to
the recipient in a hidden way. Here, the messages are concealed in such a way that
they are hardly noticed. Examples of steganography include invisible ink,
chaffing and winnowing etc;
(g) Cryptography: This is art and process of writing in secret characters. This
technique is different from steganography because the message is not hidden but
90
CSS 243 Principles of Security Practice and Management
it is the meaning of the message that is coded while steganography primarily deals
with the writing of hidden messages.
(h) Concealment Devices: These are devices that we can secretly hide
information or things (i.e paper) and they will look kike ordinary object. Example
of these are (special) books (especially the religion materials), candles, coin, etc;
(i) Diversion Safe: This is device which can be left open while concealing
some information materials in its hidden compartment that can be hardly noticed
by anybody;
(l) Pseudo Operations: These operations are often targeted towards collecting
strategic information for intelligence purposes. They are usually adopted by states
(nations) to locate and break into the insurgent areas by sponsoring a number of
91
CSS 243 Principles of Security Practice and Management
state agents who will pretend to be sympathetic to the cause of the insurgents.
These state agents (defector) deceive the insurgents by fighting along with them,
the anti-government forces (Cline, 2005).
Basically, the aims of carry-out pseudo operations may include collection of vital
information for long term or short term intelligence, or covert activities like
assassination of palpable foes or decimation of the enemy’s ranks etc. Law
enforcement agencies particularly the police usually apply this technique by
sponsoring defectors to enemy’s camp and pose as if they are also anti-
government;
I could remember in 2003 gubernatorial election in one of the state in Nigeria, the
leading opposition party was alleged of planning to kill some thugs with po lice
uniforms with the aim of snatching the ballot boxes and filling them with
unlawful ballot papers. The ruling party, later, intercepted a vehicle, in the
company of law enforcement agents, and after searching that vehicle, they saw
thumb printed ballot papers, just few weeks to the election.
Also, a raid was conducted in a public school where police uniforms and ballot
papers already thumb printed for the opposition party and a lot of dangerous
weapons were found. One important thing to note is that it’s likely that the ruling
party positioned some “straw men” (its agents) among the ranks of the opponent,
collecting intelligence which can be used to monitor or identify the weakness of
the opponent, or even implicated the opponent for the purpose of having strategic
advantage over the enemy party;
(n) Sex and Honey pots: How will you feel, if you find a poster or in the
media, the picture of a deceased man whose family is announcing his demise, and
in the course of the public announcement, it is said that the man died after having
a (marathon) sex? I know many people will burst into laughter considering the
novelty or strangeness of the content of that announcement. This is because most
families would rather put it as: ‘he died after a brief illness’.
For better, for worse sex has remained one of the effective means of intelligence
collection. Several kingdoms and empires have collapsed to evils that sex is
capable of evoking in intelligence collection; sex is a very good tool in
information supping. The law enforcement agents use it to gather information,
which can assist them to arrest some criminal suspects. Criminals suspects also
92
CSS 243 Principles of Security Practice and Management
apply it to get valuable information from security chiefs by trapping with women
particularly those considered as ‘women rapper” (womanizers), to escape arrest
by the law enforcement agents.
There are two basic ways that this technique can be facilitated: Internal and
external. The external sources appear to be more effective than the internal. The
external may include commercial sex workers specific, female members of the
group (or agency, girl friends (or boy friends) etc. The internal may include one’s
spouse, and among those that commit incest, we may have daughters, female/male
cousins, parent, mother (in-law) or father (in-law) among others.
The internal source(s) usually has (have) emotional attachment to the target
person(s) which can make it a great risk using the internal sources for intelligence
task. This is because, there is tendency that such people will give false
information (due to the bond or blood ties they have with the target persons. But,
there are some exceptions.
(o) Walk-ins: walk-ins also play great role(s) in intelligence collection. Walk-
ins are those that voluntarily give information to law enforcement agents. But, it
is quite important that the information must be subjected to scrutiny and analysis
to know if it is aimed at assisting the security operations in the combat of crime or
meant to deceive security personnel.
Exercise
Explain various means through which intelligence can be gathered.
4.0 CONCLUSION
Therefore, intelligence is not only collected to detect crime and identify the
offender, but also to prevent crime and insecurity. The intrusive nature of
intelligence collection has become a subject of (great) debate. This is because
most intelligence collection methods can undermine the right to privacy of
individual(s). Some of the means through which intelligence is collected have also
brought up the issue of moral question. This is because they are capable of
93
CSS 243 Principles of Security Practice and Management
5.0 SUMMARY
In this unit, we have been able to cover a wide spectrum of issues in our
discussion on the subject of intelligence collection. We began our academic
journey into the subject (of the day) by considering some of the available
definitions of intelligence collections for conceptual purpose(s). Thereafter, we
focused on various disciplines of intelligence collection. The third (and last) area
of discourse was the means of intelligence collection. I strongly believe that you
have found this unit interesting.
Hannah, Greg; Kelvin A. O’Brien and Andrew Rathmell (2005), Intelligence and
Security legislation for Security Reform, Technical Report for the UK’s security
Sector Development Advisory Team, RAND Corporation.
Silverstein, ken (200), “Sex and the CIA” Harpers Magazine, April 17, Also
available on .harpers.or/archive/2007/04/sb-sex-and-the-cia. Retrieved on 1st
January, 2008.
The US Dept of Defense (12 July, 2007) Joint Publ ication 1-02 Dept of Defense
Dictionary of Military and Associated Terms www.cia.gov/library/center-for-the-
styd y-of-intelligence/kent-csi/docs/vo8ila02p-0002.htm. Retrieved on 8th
January, 2008.
94
CSS 243 Principles of Security Practice and Management
95
CSS 243 Principles of Security Practice and Management
Unit 4
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Intelligence Analysis
3.2 Pillars of Intelligence Analysis
3.3. Steps in Intelligence Analysis
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
2.0 OBJECTIVES
96
CSS 243 Principles of Security Practice and Management
This is the process of determining out of the available information, the ones that
are useful in producing intelligence. The truth is that it is not all information
gathered for intelligence will be useful, particularly as they relate to human nature
analysis can also be described as:
However the services of knowledgeable persons are often required for intelligence
analysis, considering the task of revealing the facts from available information,
often through systematic evaluation or assessment. As you are expected to know,
dealing with human-beings, one needs to be very alert mentally. This is because
man may be sometimes mischievous and will try to hide the truth by giving you
false information.
Moreso, the Nigeria Police is also bedeviled, in its operations, with the problem of
ineffective intelligence analysis or intelligence misanalysis. The second problem
is very fatal, that is having security personnel acting on information without
considering the merit of the less professional men and officers of the police
institution, and this shows that the recruitment process(es) in the appointment and
placement of people into its fold is (are) questionable. Do you know how many
innocent people have been killed, maimed or wrongly prosecuted by the Police in
Nigeria?
97
CSS 243 Principles of Security Practice and Management
I directly have a chat with one policeman, who told me that they shot some
young-men to death at the back of their station. The policeman informed me that
an elder brother to one of the guys visited the police station, and reported that he
was suspecting his younger brother and his friends were into armed robbery. He
asked the police to swing into action.
Though, the action of the police to burst the target place was commendable but
later actions were unprofessional and criminal. So, they searched the whole place,
and found some incriminating objects like arms and ammunition. Thereafter, the
young-man who was reported by his brother as well as other friends and visitors
were taken to the station. The suspects pleaded innocence to the police. In a
regular extra-judicial jingoism and killing by most security personnel in Nigeria,
the boys (suspects) were brutally murdered by the police personnel in question.
One fact must be noted here, the police agents failed to do their job (investigation)
as demanded by the law while exchange of fire should be in self-defense, and
shooting to death any suspects (or convicts) can only be ordered by the court (of
competent jurisdiction). The concerned police staff that carried out that dastardly
action failed to subject the information given to them by an elder brother to one of
the slain victims (suspects), to critical analysis to know if the information was
genuine or deceptive.
Now, just imagine a situation where two brothers are fighting each other over the
property left by their late father (or mother), and the elder one having the belief
that he can cheat his/her younger one. But the younger one can resist his/her
brother’s (or sister’s) attempt,. Hence, in a situation of conflict between the two
particularly when the elder one is greedy may take any dimension. The conflict
may involve the use of thugs or supernatural attacks or even clandestine tactics
such as the use of hired killers, set-up etc.
What I have gathered from my inquiry is that the policemen failed to build any
scenarios about the information they were about to act on. Even, after arresting
those boys, one would expect them (the police) to take time in investigating the
matter. They only swung into killing of the boys without ascertaining their guilt
(or innocence). What a barbaric way of security management?!
98
CSS 243 Principles of Security Practice and Management
Exercise
Define the term intelligence analysis.
As I have mentioned earlier (in the last segment of this unit), analyzing
intelligence is a very challenging task. This is because the analysts are confronted
with a number of issues that can affect the outcome of the analysis. One of such
factors that can mitigate or undermine intelligence analysis is value. Value tends
to create identity and imaging in the mind(s) of (any) analysts.
However, it is pertinent for intelligence analysts to avoid those turning their back
to the pillars of intelligence analysis, which are the factors that can promote
effective intelligence analysis, and these include:
(a) Boldness and Honesty: Honesty, they say, is the best policy. It is expected
that for effective discharge of his/her duties, intelligence analysts must not only
be honest but must also show to be honest. Analyst should not allow some
extraneous variables or selfish motives affect his/her job. And in maintaining
honest posture and resilience against distortion of facts, analyst will need to be
bold, thus:
99
CSS 243 Principles of Security Practice and Management
Reflecting on the last statement “It is better to be mistaken than wrong” in the
above comment made by Watanabe, you may agree with me that the fear often
exhibited by policy makers, from being found wrong in the choice of policy
options, usually accounts for the ill-advice they get here and there. It is
unfortunate that these ill-advice, most times influence their policy direction(s).
Therefore, it is important for policy makers to have intelligence advisors and there
should be significant amount of trust in their relationship. Also, the intelligence
advisors are advised not to misinform the policy makers or the executive whom
they are working with for any reasons, and there must be honesty;
As an analyst, you need to comply with your customer’s demand and make sure
that intelligence is produced in a very interactive and self explanatory way, such
that the customer will find it easy to understand. Therefore, you need to consider
the educational background of your customer, and simplify the technical words to
carry him/her (customer) along;
The intelligence analysis (IA) professional is confronted each day with high
demands for rapid, yet accurate assessments that require discovery and
100
CSS 243 Principles of Security Practice and Management
In addition, after organizing the information, the process of evaluation will take
place to assess the value of each of the information and the analyst will come up
with some hypotheses; and
Exercise
Explain the pillars of intelligence Analysis
There are various steps analysts take, in the performance of their official
assignments, to analyse intelligence. Though, there is no consensus on any
particular process to adopt by analysts. They often adopt different approaches not
only in the collection but also in analyzing the intelligence. Nonetheless, various
steps in the process of intelligence analyses may include:
(a) Definition of the Problem: analysts will need to know the questions in the
minds of their customers which bother on their intelligence requests. If the
questions are unclear the analysts will need to demand for further clarification to
illuminate the thinking of the customer;
(i) Lesser the rate of a loan facility, the higher it becomes attractive to people
(customers and prospective customers).
101
CSS 243 Principles of Security Practice and Management
(ii) Lesser the conditions attached to the access of the loan facility, the more the
people get attracted to seek for loans from the bank
(iii) it is better to concentrate more or low income earners than high income
earners considering their population. Etc.
(c) Data Collection: Analysts require information to do their work. In the case of
case of not having information, already the analyst requests for the services of
human intelligence collectors like spies or agents. They also rely on other sources
of data collection communication interception, satellites. But these tasks (of
intelligence collection) are carried out by intelligence collectors. Sometimes,
analysts rely on information gotten through newspapers, public records, or archive
etc;
(e) Evaluate (Test) Hypotheses: This is the most crucial stage of intelligence
analysis. Analysts should ensure that they carry out a comparative analysis
between the gathered evidence and their formulated hypotheses, with the
application (or use) of different analytical tools and methods like Analysis of
competing hypotheses etc. This process will enable us to identify the hypotheses
that are not useful or irrelevant, which may be thrown-out
(f) Production and Packaging: After evaluating the hypotheses, analyst will
come up with (intelligence) findings which he/she considers in packaging the
intelligence product. In the production of intelligence, three issues usually come
to bear, and these include:
Timeliness: Timeliness includes not only the amount of time required to deliver
the product, but also the usefulness of the product to the customer at a given
moment.
Scope: Scope involves the level of detail or comprehensiveness of the material
contained in the product; and
Periodicity: Periodicity describes the schedule of product initiation and generation
( .en.wikipedia.org/wiki/Intelligence_Analysis)
102
CSS 243 Principles of Security Practice and Management
(g) Peer Review: There is general belief that two good heads are better than one.
After the production of intelligence, it is advisable for analysts to seek for
comments from their colleagues in intelligence community who may identify
area(s) of deficiency in the intelligence product. This view is also shared by the
United States Department of Defense (DoD):
Coordination with peers is necessary ----if you think you are right and the
coordinator disagrees, let the assessment reflect that difference of opinion
and use a footnote, called a reclama (see .dt ic.mil/do ctrine/jel/new
pubs/jp102.pdf).
Also, as an analyst you should always have it at the back of your mind, that no
man is an island (of knowledge). For this reason, it is important that one should
choose among his/her colleagues those to work with as a team. In this case good
human relation and trust-building are essential; and
Exercise
How do you explain various steps to be undertaken in the production of
intelligence?
4.0 CONCLUSION
103
CSS 243 Principles of Security Practice and Management
5.0 SUMMARY
In this unit, we have looked at a wide range of issues concerning the subject
matter: intelligence analysis. We set out in our academic adventure by first
looking at some of the many definitions of the term, intelligence analysis.
Thereafter, we drew our searchlight on the various pillars of intelligence analysis.
And the last area of inquiry was highlighting various steps of intelligence
analyses. Thank you for your attention.
Greitzer, F.L. (March 2005), Methodology, Metrics and Measures for Testing and
Evaluation of Intelligence Analysis Tools, Pacific Northwest Division of Battelle
Memorial Institute.
104
CSS 243 Principles of Security Practice and Management
Krizan, Lisa (June 1999), Intelligence Essentials for Everyone, Joint Military
Intelligence College. Also available on .scip.org/2_getintel/ess.php.
105
CSS 243 Principles of Security Practice and Management
Unit 5
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Definition of Counter-Intelligence
3.2 Aspects of Counter-Intelligence
3.3 Protective Disciplines and Counter-Intelligence
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
In the last three units our focus was on the meaning of intelligence, intelligence
collection and analysis. Every nation usually develops mechanisms and
establishes institutions that engage in intelligence activities and it assisting her to
have strategic relevance in the world polity. In achieving the overall security
agenda, nations do not only focus on how various intelligence activities can
enhance their internal security, they also consider creating measures and
platforms that can counter any intelligence (or security) threats emanating from
both the local and external enemies which are capable of undermining the national
security.
2.0 OBJECTIVES
106
CSS 243 Principles of Security Practice and Management
107
CSS 243 Principles of Security Practice and Management
Branch, she can effect arrest or interrogate or facilitate a search warrant (on) the
suspected enemies or intelligence threats.
In the United States, the Federal Bureau for Investigation (FBI) appears to be the
major counter intelligence agency in the country. In Nigeria, there is clear cut
separation of functions among the intelligence agencies in the country. What I
mean is that there is no actual intelligence organization that is basically mandated
by the law for counter intelligence only.
In this segment of the unit, we are going to look at various aspects of counter
intelligence, though there may be more aspects than the ones we are providing in
this study due to the dynamics of counter intelligence activities and studies.
Notwithstanding, we shall be focusing on four major aspects of counter
intelligence. These include:
(a) Defensive counter intelligence: This aspect draws its attention on identifying
vulnerable areas in one’s intelligence organization(s) which can be explored by
foreign intelligence services (FIS). The term, FIS in (modern) counter
intelligence goes beyond foreign countries or agents in its meaning. It therefore
refers to opposition, either internal or external.
This explains some of the covert suppo rt being received by some local insurgents
in a number of countries from Al Queda network, to fight their governments who
are considered to be pro-West by Al Queda and the likes. The pro-American
posture of the Iraqi government (majorly controlled by Shiites) has attracted
insurgent condemnation not only from the Sunni dissidents but also violent threats
from the Shiites militants.
The Shiites insurgency in Iraq has added a new twist to be post-war Iraq
discourse. This is because most people would think having Shiite led
government, the majority Shiite population would welcome it and give her
necessary support to succeed. But the event has turned out to be contrary,
resulting from the fact that more aggression comes from the Shiites rather than
Sunnis.
108
CSS 243 Principles of Security Practice and Management
(b) Offensive Counter intelligence Operations: These include all activities that are
targeted towards arresting the mischief of the enemy-parties. It is important to put
in place measures that will undermine the structure and personnel of hostile
intelligence organizations (Wisner, 1993). This aspect is also known as counter
espionage. Here, efforts are made towards identifying and arresting the agents of a
foreign intelligence services or enemy parties. If the hostile agents are diplomats,
the friendly nation or host country should declare them personal non grata, and
facilitate their immediate repatriation.
The hostile agents who are not diplomats are to be arrested by law enforcement
agents, and be prosecuted. In some countries, if a spy is caught within or outside
their intelligence domains working for foreign interests, usually face highest
penalty (death sentence) while some other countries only have them imprisoned.
Intelligence services can also subject the detained hostile spies to torture, forcing
them to reveal their planned clandestine actions for the purposes of liquidating
such plans and prevent similar threats from any other hostile spies in the nearest
future. Recently, Nigerian government through its security operatives arrested
some people alleged to be foreign spies and their local co-conspirators who were
accused of espionage;
Exercise
Discuss aspects of counterintelligence?
109
CSS 243 Principles of Security Practice and Management
These disciplines don’t actually have any direct relationship with intelligence
activities but only play some complementary roles. They assist to reinforce
counterintelligence measures to undermine enemy’s attacks on the intelligence
community and nation at large. They include the following:
Infrastructures like building require measures than can counter any threats from
the enemies. The enemies can make use of tall buildings; after gaining access to
it, to monitor the movement of the occupants of another building being targeted.
Consequently, after collecting intelligence, the enemies will then identify the
vulnerable areas, and strike. This can explain, the tactics adopted by the Al
Queda network in the planning and execution of the carnage (Sept 11 incident)
that visited the United States. The enemies studied the US and geography,
noticing that there had been tight security at its borders making it difficult to
smuggle in explosives into the country.
But the attackers chose to hijack commercial aircrafts to hit them against target
building(s). The US intelligence community failed to mount surveillance on the
Arab immigrants who pretended to be students, enrolled to study the art of
piloting. One would expect the immigration service to have alerted the
intelligence community to mount a close watch on the suspected immigrants, and
plant electronic bugs at their residence.
Physical security may include fortifying infrastructures and building with security
gadgets and other measure like the use of window blind. The use of window
blind will deny the enemies seeing your activities in the room through the
windows. Intelligence facilities need to be protected by putting in place high
construction standards that are capable of mitigating enemy’s attacks and ‘might
slow down, but certainly not stop, a determined entry attempt that used
explosives’ (see .en.wikipedia.org/wiki/Counter-int elligence);
(b) Personnel Security: Sometimes foreign intelligence services use some of the
trusted people in an organisation or state to unleash their terror or attack. FIS can
decide to buy over some of the people working for your organization or home
government who have access to some secrets that may be useful to FIS. In order
to avoid a situation like this, intelligence services will need to put in place
security clearance system (or positive vetting) to ascertain if a person within the
organization, holding sensitive position can still be trusted or not.
110
CSS 243 Principles of Security Practice and Management
The services will have to conduct periodic clearance on the people holding
sensitive or strategic positions. One of the ways to do this is secret monitoring of
one’s spending as against his/her income. If one spends far above his/her
legitimate earnings, such a person needs to be scrutinized. There must be
electronic reviews of one’s financial records, and it is also important to examine
the lifestyle of each staff to identify the areas of vulnerability of each of them, and
apply measures that can limit or curb possible compromise among (the)
personnel;
111
CSS 243 Principles of Security Practice and Management
for protecting the hostile acquisition of information either from the patterns
of flow of messages, or the content of messages… (ibid).
Exercise
Discuss the protective discipline for Counterintelligence
4.0 CONCLUSION
5.0 SUMMARY
In this unit, we have been able to discuss a number of issues of regarding counter
intelligence. We began our intellectual discourse by looking at some of the
available definitions of the term, counterintelligence, in the actualization of our
task of conceptualization. Thereafter, we explained various aspects of
counterintelligence. The third and the last subject we treated was discussing the
major protective disciplines for counterintelligence. I wish to congratulate you
for successfully completing another unit in the course. Thank you for your
attention.
112
CSS 243 Principles of Security Practice and Management
113
CSS 243 Principles of Security Practice and Management
MODULE 3
Unit 1
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 3.1 Definition of Secur ity Personnel
3.2 Causes of Trauma
3.21 Job Design
3.22 Staffing
3.23 Training and Staff Development.
3.24 Performance Appraisal
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Security organizations, public and private, carry out their functions and
responsibilities within the scope of what laws allows them to do. Apart from the
scope of their operation, one thing that is very important, and what that
determines their success is the nature or quality of their staff or personnel.
The truth is that if you do not have the right staff for the right positions, there is
the likelihood that the inputs which such staff will provide for the organization
will be ineptitude. In situation like this, meeting the overall goals of the
organization will be difficult. Therefore, it is pertinent to focus on the concept and
practice of personnel management as it impacts on securitization.
2.0 OBJECTIVES
114
CSS 243 Principles of Security Practice and Management
There has been a consensus among scholars and practitioners in management that
the heartbeat of any organization, be it security, finance, insurance, media etc, is
the quality of the human elements within its fold. It is no surprising that
management theorists have also agreed that of all the resources available in any
organization, it is only man that grows and develops. Some of the definitions of
personnel management may include:
How the efforts of the people who make up the enterprise can be so
organized and developed in order to attain the highest level of efficiency,
adaptability and productivity (Barber, 1970).
Security job is a very challenging one, considering the conditions attached in the
recruitment of personnel. Apart from having mental stability and alertness,
secur ity personne l must also be physically fit. But, for them to perform their
functions effectively well, there must be job design in the first instance, which
will serve as a manual that specified “the content, method and relationship of jobs
115
CSS 243 Principles of Security Practice and Management
a) The productivity aspects: These are aimed at meeting the goal of the organization
as its concerns productivity. Therefore, it is pertinent in security business for the
management (or government for public security outfits) to pay huge attention on
‘operational efficacy’ targeted at achieving greater results. Thus, quality inputs
often lead to quality outputs;
b) The job-holder’s aspects: The rationale behind these is geared towards satisfying
the needs of each staff particularly as it concern his/her interests, challenges and
achievements.
Olise (2005) goes further to illuminate the ‘complexity’ orbit that exists in the
relationship between the two set aspects of job design as elaborated above.
According to him:
However, job design must first draw the content of the job by enunciating various
work tasks or activities, which the organization demands from its personnel to
perform for the ultimate purpose of achieving its overall goals. In attempts to
integrate the individual goals of the personnel within an organization, a number of
stages need to be considered. These we shall be looking at in the next segment.
(a) Job Analysis: This is the process through which security organization (or
any other organization) gives a detailed explanation and catalogue of the
purposes, expectations, duties, features, behaviours and relevant skills that a
particular job evokes on the job-seekers. Olise (2005) describes job design as”
116
CSS 243 Principles of Security Practice and Management
By and large, job analysis is a very essential element of job design because it
serves as a platform that enables any organization to accomplish other principles
of personnel management such as recruitment, selection, training among others,
which are very necessary for delivery of quality services by the employees for
organizational development and attainment of the overall goals of the
organization. In our focus on analysis as a key element of job design, it is
pertinent we quickly look at various features of job analysis and these include:
The purpose of the Job: The rationale behind the inauguration or establishment
of any security organization is not without a purpose. For example, the
establishment of the Economic and Financial Crimes Commission (EFCC) by the
Act of parliament are basically to prevent, alleviate or reduce or eliminate (if
possible) all offences relating economic and financial crimes like advanced fee
fraud, money laundering, diversion and looting of public funds by public
official(s) and their private co-conspirators among others.
Content: This can be described as the totality of what the job entails. Therefore, it
under scores the nature and scope of job especially as it concerns work task,
functions, obligation, duties and operations to perform. If the content of any job is
– well spelt out, every employee with find it easy to identify the task he or she is
to perform and the quality of the inputs from the employees has direct impact on
the outputs which determine the ability of the organization to meet its
fundamental goals.
For instance, in Nigeria Police, there are several police stations cutting across –
every community in the federation, and they are managed by a number of officer
sand men of the police institution and each of the stations is led by a divisional
police officer (DPO). The activities of the police personnel in each station as it
concerns the delivery of their statutory functions and duties must be accounted
for.
The police personnel cannot go to the armoury to fetch some ammunition without
documentation. No policemen or officer can shoot in the public or elsewhere
117
CSS 243 Principles of Security Practice and Management
Again, in Nigeria Police, police personnel in various stations report to the DPOs
or their representatives, the DPOs report to the Area Commander who also report
directly to their respective commissioners of police. The Commissioners of Police
report to their zonal heads (who are usually on the rank of Assistant Inspector
General of Police). The AIGs report to the inspector General of Police (IGP) or
his representative(s) who often are superior officers (DIGs). The IGP is also
answerable to the executive (the presidency) or relevant minister.
This chain of authority allows for easy identification of the staff that should
account for any deficiency recorded by the force in its performance of its statutory
duties and operations for satisfying the goals of the police organization.
Responsibilities: In the course of carrying out your official duties as security men
(or offices), it is incumbent on you to exhibit substantial level of mental alertness
or ability. In performing your functions as security employee two issues come to
your mind in making decisions. These include.
Then, what is the relationship between job analysis and the decision-making
models relating to responsibilities in the discharge of official assignment? Well,
the relationship is that the programme decision making involves the process of
itemizing rules and procedure that guide one’s operational decision making. For
instance, some of the operational rules of a private security firm may include
searching of persons and vehicles that go in and outside of their places of
operation and arrest those found going out with company’s property and find out
if the management is aware of it or not. Therefore, if the security operatives work
within the codified and written operational rules of the organization, the
organization shall be responsible for such actions.
118
CSS 243 Principles of Security Practice and Management
personnel to arrest a gang of trans-border armed robbers that has been threatening
the internal security of the country, after having an intelligence report that the
robbers are still operating in a particular locality.
On getting there, the robbers resist arrest and engage your team in gun battle. And
through your superior fire power, the armed robbers ran into a vehicle containing
some civilians and the civilians are therefore held hostage by the bandits. The
bandits driving in the snatched vehicle (containing some civilians) and heading
towards the border to escape.
Here, you may consider the elusive nature of the criminal gang and its destructive
antecedents. And you may also find yourself in the waters of dilemma, if you are
also aware that similar tactic had been used by the robbers twice previously to
facilitate their escape. Then, you may decide that there should be collateral killing
if it is the best option to hunt–down the robbers. When we are talking about
collateral killing, we mean is the adoption of an aggressive strategy in which
innocent people are not spared in an attempt to hit a target.
(b) Job Description: This is the art of giving a detailed account of the task, which
a particular job demands. Somebody who is not physically fit cannot perform
effectively in security occupation. Though, such a person if he is very intelligent
and resourceful, security organizations may consider him as consultant. Job
Description involved providing brief explanation of what a job entails.
As you might have seen in some of the pages of a number of national dailies
(newspapers) or elsewhere, advertiser- organization- demanding some qualified
people to apply for some vacant positions in their organizations. Some of them
usually briefly explain the task(s) each position requires, the job location, whom
to report to among other variables are also captioned. The features of job
description include:
i. Job title: Job must be defined with a title for job-seekers to have an idea about
what the job entails;
119
CSS 243 Principles of Security Practice and Management
Bio Data
Academic Qualification;
Professional Qualification;
Years of Working Experience
Publications (where required)
Distinctions and Awards
Strengths and Weaknesses; etc.
Exercise
(i) Describe any two stages f job design
(ii) What are the features of job description?
(iii) What conditions are usually contained in job specification?
3.22 Staffing
120
CSS 243 Principles of Security Practice and Management
(a) The Recruitment and Selection: Here, we advertise the requisite conditions
which prospective employee must have before they can be considered for the
selection process (short listing). In every security organization, either public or
private, there are two basic levels of personnel: Senior (Officer) and junior (Men).
Apart from age, physical fitness, height and mental alertness; educational
qualification is a key condition that determines which level one can apply for. In
Nigeria, Short Service (Cadet) recruitment exercise in the Nigerian Army
demands that it is only people with tertiary qualification like the first degree and
(possibly) Higher National Diploma can compete for the vacant positions.
(c) Placement: In security organization, after reaching the stage of interview, the
shortlisted candidates apart from the oral and written interviews, may be asked to
121
CSS 243 Principles of Security Practice and Management
undergo a short physical test which is the main decider. After passing the
interview the successful candidates will undergo relevant training courses for a
specific period of time. For instance, in Nigeria Police, such training takes 18
months for cadet appointees while 6 months for the recruits. It is after the training
exercise that the newly employed personnel will be commissioned and placed in
various units. Some will go into intelligence unit, some to traffic control, some to
maritime surveillance units. Some will be posted to anti robbery squad, some to
bomb detection unit, some to foreign missions etc.
(d) Transfer: Security job requires development of skills and potentials, and so
getting new ideas is highly encouraged as this is one of the reasons why security
personnel are moved from one department to another. It helps in skill
accumulation and improved knowledge through eclectic acquisition of ideas from
one department to another.
Again, the nature of security occupation also allows for the personnel to be
transferred from one locality to the other. Another reason for transfer may be due
to promotion. If a security operative is promoted and there is no office vacant for
him/her to occupy and there is vacancy somewhere then the management may
decide to transfer him/her to where there’s vacant office, and
Exercise
Briefly describe staffing and its basic elements.
122
CSS 243 Principles of Security Practice and Management
Bearing in mind the foregoing, you may agree with me that training is a key
element of staff development. New security technologies are invented and
manufactured from time to time. So, security organization must make sure it
updates its operational hardware i.e. weapons, vehicles, and other technologies,
information systems and intelligence, and building capacity for personnel
development.
However, there are various methods through which security personnel have their
training and these include:
On the Job training: This form of training i.e. acquired simultaneously as the
security personnel carry – out their duties. For instance, it is not obligatory on the
police authorities to provide the officers and men of the organization magical
power (Juju) to combat the armed robbers. But some of the security operatives
have learnt the relevance of traditional prevention and control mechanisms due to
the ugly experience they’ve had in their encounter with armed robbed in Nigeria.
Some of the bandits use Juju that protects them against bullet penetration of their
bodies. So, several police personnel now patronize traditional witch – doctors, not
only to be equipped with spiritual devices that liquidate the spiritual power of the
bandits themselves against bullet penetration, but also to protect themselves
against bullet penetration. There is no doubt that we learn new skills and ideas
due to some challenges we experience on the job;
Off the Job Training: Sometimes, we learn new skills off our regular duties by
going to the training college. This kind of training allows the personnel to be
temporarily out of duty posts for training purpose (s). In Nigeria, virtually all the
security agencies have their own training schools or centres. This is with the aims
of giving the employees opportunities to widen their horizon and acquire new
security skill and ideas for effective performance and quality delivery of services
aimed at attaining the overall goals of the organization, and
External Training: This form of training totally takes place outside the
organizational environment of the security personnel. For instance in an attempt
to fortify the efficiency of its personnel, the Nigeria Army can decide to send
some of its staff to National open University of Nigeria for a short course in
criminology and security studies in order to equip its staff with emergent strategic
planning and information system. Other examples of external training may
123
CSS 243 Principles of Security Practice and Management
This is another principle of personnel management and the term refers to a system
that helps to evaluate the past and present behaviour of employees with the use of
systematic and standardized form which can be used in future by employee and or
the employer. According to Olise (2005:138), performance appraisal:
(c) Behaviour Rating Scale: This involves rating of a set of attributes in relation
to the behaviour or act of an employee. These attributes have great impact on
his/her performance at work, as they can contribute to or undermine his/her
efficiency. It is often administered by the employee’s supervisor;
124
CSS 243 Principles of Security Practice and Management
(e) Check List Method: Here, the behaviour of the employee is rated by drawing
a long list of positive and negative adjectives, and see how they apply to him or
her. And all the variables are to be given equal importance;
(f) Multi Raters: This method involves evaluating the employee’s behaviour or
act through several sources like supervisors, subordinates, colleagues,
himself/herself etc. It is also known as the 360o appraisal.
Exercise
What is performance appraisal?
What are the methods of performance evaluation?
4.0 CONCLUSION
The patrimonial nature of the nation’s polity has also worsened the situation,
where appointment and promotion of security personnel are based more on how
many patrons one has in the corridor of power. Our discourse on security
personnel management cannot be exhausted n this unit. Therefore, we shall
continue in the next unit, to discuss some other principles of personnel
management.
5.0 SUMMARY
125
CSS 243 Principles of Security Practice and Management
In this unit, we have been able to describe the term personnel management and its
various principles have also been identified. Due to limited time and space in this
unit, we’ve been unable to exhaust the available principles of personnel
management but we shall complete our discussion on it in the next unit. The ones
we have been able to explain so far include job design, staffing training and staff
development and performance appraisal. I really appreciate your attention.
Meanwhile, if you have any difficulty in understanding any part of this unit,
please feel free to consult your tutorial facilitator. Congrats for successful
completion of this unit. Best of studying!
Define the following terms personnel management, job design, staffing, training
and performance appraisal.
.webird.tcd.ie/bitstream/2262/5139/1/jssisiVolXXIIPartV_3677.pd
f). Retrieved on 30th January, 2008.
Unit 2
CONTENTS
126
CSS 243 Principles of Security Practice and Management
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Compensation and Reward
3.2 Job Satisfaction
3.3 Leadership
3.4 Communication
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1. O INTRODUCTION
2.0 OBJECTIVES
There is a consensus that the two concepts (compensation and reward) are
very strategic in the effective management of (security) personnel or employees.
Conceptually, according to Funk and Wagnall’s standards Dictionary,
compensation can be described as “the act of compensating – to make suitable
amends to or for; requite, remunerate”. To counterbalance or make up for;
127
CSS 243 Principles of Security Practice and Management
offset….”, while reward may mean something given or done in return; especially,
a gift, prize, or recompense for merit, service, or achievement’.
Drawing our analytical minds to the foregoing, you may agree with me that if we
conduct a dissection on the two concept for conceptual anatomy (meaning), what
we will see are: to make for any damage suffered by any employee in dispensing
his/her official duties (compensation) and recognizing the good efforts and
contributions made by an employee to the development of the organization by
giving him an award or gift or promotion to encourage him/her to make more of
such noble contributions and admonish other employees to borrow a leaf from the
awardee’s success or elevation.
It is no gainsaying to stress at this juncture that the two concepts are very
important in promoting culture of hard work and diligence among the employees
in security sector. One may continue to wonder why our police personnel in
Nigeria are not performing like their counterparts in the United States and other
developed countries. Let’s begin our response to such a question by looking at the
issue of compensation.
But in Nigeria, contrary is the case. Even when compensation is to be paid for
permanent disability or death of any security personnel (both public and private),
the families of the affected employees and even expected to give bribe (monetary
or/and in kind). Some widows may even be asked to sleep with certain officers
before they can be ‘helped’ to get the paltry compensation.
128
CSS 243 Principles of Security Practice and Management
is given to security personnel (and virtually all workers), and there is very high
cost of living. This situation is capable of inhibiting the progress of any nation or
organization especially as it relates to security management.
Nonetheless, people have begun to see corruption as the means to augment their
poultry wages (that are not promptly and regularly paid) to improve their marginal
survival. There is no doubt that a system like this will definitely popularize crime
and criminality both in public and private places, and the security personnel also
become criminalized. Let’s us quickly look at the elements of compensation and
reward.
(b) Wage: This is hourly pay made to any employees for the work done;
(e) Insurance: This enables the employee to have a sense of security, which will
make him in the case of any eventuality like death or permanent disability to have
the hope that either him/herself or families will be taken care of.
Exercise
(a) Need fulfillment Model: Here, job satisfaction is a function of the degree at
which an employee is allowed by organizational behaviour, to meet his/her
129
CSS 243 Principles of Security Practice and Management
individual needs or desires. This explains why most of the security personnel
(both in public and private practice) have found it difficult to meet their individual
needs and suffer deepening dissatisfaction at work. One of the reasons is that
many of them found their ways into security occupation for lack of alternatives,
resulting from job drought and high unemployment. Anybody in that category of
people may not see his/her occupation satisfactory considering insufficient
motivation, hazards, public hostility paltry take home pay, inadequate operational
tools and machineries, etc;
(b) Discrepancies Model: This denotes that job satisfaction is a subject of Met
Expectations. Met Expectations can be described as the difference between
employee’s expectation from the organization (in terms of remuneration
emoluments and other incentives) and what he/she actually gets from the
organization;
(c) Equity Model: This means that employee gets job satisfaction based on how
much he/she is being treated fairly at work. No one like to work in a place where
he will be cheated or shot-changed by the employer (or management);
(e) Value Attainment Model: This explains job satisfaction in terms of how much
employees are allowed by the organization to meet their work values: personal
belief and principles. For example, an honest man will find it difficult to attain
any job satisfaction in an organization that institutionalizes act of corruption
(either overtly or covertly).
Exercise
Describe job satisfaction
3.3 Leadership
130
CSS 243 Principles of Security Practice and Management
(b) Excellent interpersonal relations and ability to (re)mould the motivation and
(occupational) behaviour of other people in the same organization;
Exercise
Describe the term leadership
3.4 Communication
Thus, this involves the process of message encoding, which is passed to the
employees, and if the message is not carefully coded, decoding it may be a very
difficult task. The content of any message is the function of the sender’s thoughts
feeling and perceptions. It is important to note that encoding of message should
not be applied wrongly while decoding should also be rightly applied for the
message to have a meaning to the receiver. In security organizations,
communication should consist of certain elements which include:
(a) Presence of clear and formal channel of communication among the personnel in
the organization;
(c) The course of communication should be direct and short. The use of extremely
technical terms should be avoided as mush as possible; and
(d) Competent staff should man or be in charge of the organizations communication
facilities, with good knowledge of security codes and language etc.
Exercise
Describe communication.
131
CSS 243 Principles of Security Practice and Management
132
CSS 243 Principles of Security Practice and Management
Unit 3
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining of Job Stress
3.2 Causes of Job Stress
3.3 Effective Management of Stress Among Security Personnel
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Every job, ranging from menial jobs, helping, academic and security profession
has its own hazards, or simply ‘stress’. The term job stress has become a global
phenomenon. In 1992, the United Nations submitted that job stress is “The 20th
Century Disease”. Not too long, the World Health Organization also argued that
job stress had become a worldwide Epidemic. Due to the negative effects that
stress may have on any employee, it is important that we discuss the subject in
this unit.
133
CSS 243 Principles of Security Practice and Management
digestive problems and sexual disorders. There are also short term effects on the
performance such as inability to make good decisions, damages to positive frame
of mind needed for high quality work and also consumption and diversion of
mental energy to frustration, anxiety and temper.
Stress also has effects on behaviour and these include bad moods, reduced
personal effectiveness, changing work habits and increased absenteeism. Such
experiences do harm employees’ health and ability to perform qualitatively and
quantitatively which even affect the optimal profitable productivity of the
organization and the nation in general.
2.0 OBJECTIVES
The concept of job stress is often confused with challenges at work, but they are
different concepts. Challenge(s) energizes and propels individuals physically and
psychologically. It motivates us to learn and acquire new skills, and to be
competent in our various chosen jobs. Since we feel relaxed and satisfied after
overcoming challenges, it is thus an important ingredient for healthy and
productive work –life. these challenges could therefore be perceived as “good
stress” that is needed.
Job stress on the other hand, is that which poses significant threat to employee’s
health and consequently to the health of an organization. According to the
National Institute of Occupational Safety and Health, commonly termed NIOSH
(1999) defined job stress as the harmful physical and emotional responses that
occur when the requirements of the job do not match the capabilities, resources,
or needs of the employee.
Wendy Boswell held that in some cases, stress can be desirable to both an
organization and individua ls. In their stress models, Boswell et al., identified
stress as challenge-related or hindrance-related. The former is defined as work
demands, although potential gains for individual while the latter is defined as job
demands that tend to constrain or interfere with an individual’s work
achievement, and which do not tend to be associated with potential gains for the
individual. Examples are lack of job security and role ambiguity.
134
CSS 243 Principles of Security Practice and Management
However, stress can be positive, some time galvanizing, energizing and propelling
one to reach optimum potentials. Some stress is therefore needed because it adds
flavour, opportunity and challenges to work-life so as to jeer up workers’ optimal
performance on their jobs.
Caplan, Cobb, French, Van Harrison and Pinneau (1975) defined stress as any
characteristic of the job environment, which poses a threat to the individual.
Beehr and Newman (1978) extensively defined job stress as a condition wherein
job related factors interact with the worker to change (disrupt or enhance) his or
her psychological or and physiological conditions such that the person (mind and
or body) is forced to deviate from normal functioning. This definition buttressed
the fact that stress is not usually negative, thus there is positive stress termed
Eustress. Stress is not a distress; it only becomes one when the body can no longer
cope with the demands made on it. (Afolabi and Oviasuyi, 2001).
1. Alarm Stage, in which the body respond when it becomes aware of stress or
threat. The individual’s resistance is lowered here;
Exercise
135
CSS 243 Principles of Security Practice and Management
(b) Shift work: This is the scheduling system of work, which impinges
excessive physical and psychological costs to the worker. Security business is one
that involves putting in place structures and personnel to work round the clock.
Thus, work shift is a regular phenomenon in the security sector. Shift work has
been found to affect blood temperature, metabolic rate, blood sugar levels,
mental efficiency and work motivation, not to mention sleep patterns, family and
social life, (Arnold et al., 1995) It should be noted that the difference between
working at night is not just that it is dark outside. The real difference is that there
are real impacts on employee’s performance, health, safety and quality of life
which if ignored could imperil employer and employee altogether.
(c) Long hours: Security job is a very difficult especially as it concerns work
schedule. Sometimes, as a security employee, your organization may send you on
special operations. These operations may take a lot of time. This can usually take
tolls on employees’ health. Breslow and Buell (1960) in their research study made
a link between long working hours and deaths due to coronary heart disease.
Apart from regular official assignments, several security employees still engage in
other commercial activities. This is because their salaries are not sufficient,
making them to look for some other businesses to complement their earnings from
security job. This situation can lead to stress. According to a research finding, no
less than 25% of young coronary patients had been working at two jobs, and an
additional 40 per cent worked for more than 60 hours a week (Russek and
Zohman, 1958). It has been generally acknowledged that working beyond 40
hours a week can lead to inefficiency.
(d) Risk and danger: Security employees that are constantly aware of potential
danger are usually prepared to react immediately. This makes them to be in a
constant state of arousal, which can result in higher stress levels. The resulting
adrenalin rush for flight, respiration changes and muscle tension are potential
threats to long term health of the workers. Though, individuals who face physical
dangers and are trained for such, experience less stress levels.
136
CSS 243 Principles of Security Practice and Management
(e) New technology: The introduction of new technology into work setting has
required all workers to adapt to new equipment, systems and ways of working.
(Arnold et. al., 1995). Cooper (1984) found in his survey that in U.K., a high
percentage of managers said that keeping up with new technology was a great
source of pressure at work. Managers in developing countries felt pressure due to
the increasing emphasis on new technology, the need to deal with an adequately
trained workforce and the imposition of deadlines.
(f) Work overload: This occurs when an individual is faced with a set of
obligations, which when taken as a whole require him to do more than he is able
to in the time available. French and Caplan (1972) described work load in terms
of quantitative overload that refers to having too much work to do, as well as
qualitative overload that refers to work that is too difficult for an individual.
(g) Work under load: This refers to repetitive routine, boring and under
stimulating work and has been associated with ill health. Cox (1980) described
work under load as problem of not being sufficiently challenged by work.
(h) Role ambiguity: This exists when the job or role is poorly defined, there is
uncertainty about job expectations and where supervisory staff and their
subordinates have different expectations of an employee’s responsibilities. It is a
situation where, as Warshaw (1979) stated “the individual just does not know how
he or she fits into the organization and is unsure of any reward no matter how well
he or she may perform”. Stress indicators related to role ambiguity are depressed
moods, lowered self esteem, life and job dissatisfaction and low motivation to
work.
137
CSS 243 Principles of Security Practice and Management
between boss and subordinate. Workers who said that their boss was low on
consideration’ reported feeling of more job pressure.
Employees who are unable to exert control over their lives at work are more likely
to experience more work stress and therefore more likely to have impaired health
(Sutton and Kahn, 1984; Saunter et.al, Al., 1989). Many studies had found that
heavy job demand, and low control, or decreased decision latitude lead to job
dissatisfaction, mental strain and cardiovascular diseases.
Exercise
138
CSS 243 Principles of Security Practice and Management
Discuss the factors that can trigger stress among security personnel.
Time management skills can also help workers to manage the multiple demands
that are often placed upon them in both work and non- work settings. This
includes reducing the number and length of meetings, reducing interruption when
working and limiting the length of telephone calls.
(b) Stress Resilience: This strategy helps employee to develop physical and
psychological stamina against potentially harmful stressors, and the most widely
recommended strategy include physical exercise, proper diet, and weight control,
(Champoux,1996). Physical exercises help in conditioning the body to be able to
face potential stressors with confidence. Stress resilience comes from the heart
and the lung conditioning, decreased blood pressure, and decreased serum
cholesterol. A balanced diet low in sodium and saturated fats help keep blood
pressure and serum cholesterols within acceptable bounds (Quick and Quick,
1984);
The most recent method of managing stress is the use of Heart or Emotional
Intelligence. Heart lock – in his or her homeostasis deliberately and consciously
so as to normalize the heartbeat and reduce distress. Another method of heart
intelligence is with the use of a technological tool called freeze–framer. This tool
helps individual to intervene by consciously disengaging from negative feelings
139
CSS 243 Principles of Security Practice and Management
Other forms of stress management for the individual include rest, vacations, being
with people that will make him or her happy. Psychotherapy, medical therapy and
Counseling are forms of stress recuperation;
(d) Stress Management: This involves programs that can teach each security
employees or other workers about the nature and sources of stress, the effects of
stress on health, and personal skills to reduce stress. The strategies may include
time management and relaxation exercises. Stress management training may
rapidly reduce stress symptoms such as anxiety and sleep disturbances; it is also
inexpensive and easy to apply. This training programs can also focus on job–
related training that improves a person’s ability to do a job;
(j) Work schedules that are compatible with demands and responsibilities
outside the job should be established;
(k) Organizations should also design their selection and placement procedures
to improve person – job fit by identifying skill requirements and skill availability
among employees (Champoux, 1996); and
Exercise
Explain ways through which stress can be managed among security employees.
140
CSS 243 Principles of Security Practice and Management
4.0 CONCLUSION
Due to the fact that job stress is estimated to cost billions of dollars or naira
annually as assessed by absenteeism, diminished productivity, employee turnover,
and consequently legal fees and insurance premiums, it is important for employers
to implement programs that promote low stress atmosphere so as to enhance good
job performance in the workplace. As a general rule, actions to reduce job stress
should be given top priority by the management of any security organization.
5, 0 SUMMARY
141
CSS 243 Principles of Security Practice and Management
Caplan, R. D. and Jones, K. W. (1975), “Effect of work load, role ambiguity and
Type A Personality in anxiety, depression, and heart rate”, Journal of Applied
Psychology 60.
Cohen, S. and Wills T. A. (1985), “Stress, Social Support and the Buffering
Hypothesis”, Psychological Bulletin. 98.
Indik, A. P., Seashere O. T. et. al. (1964), “Occupational Stress, its Causes and
Consequences for Job Performance”, Journal of Applied Psychology. 71.
National Institute of Occupational Stress and Health, (2001), Job Stress, See
.cdc.go v/niosh/jobstress.ht ml .
Sauter, S. L., Hurrell J. Jnr., and Cooper, C. L. (eds.) (1989), Job Control and
Worker’s Health, New York: Wiley.
Sauter, S. L., Murphy L. R., and Hurrell J. Jnr., (1990), “Prevention of Work
related Psychological Disorders”, American Psychologist, 45 (10).
142
CSS 243 Principles of Security Practice and Management
Unit 4
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 3.1 Trauma and Security Personnel
3.2 Causes of Trauma
3.3 Emotional Effects of Trauma
3.4 Management of Trauma in Security Career: REBT
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Security profession attracts a lot of hazards. May be, that is the reason why
several families don’t usually support any members of their households to take
security appointment especially the police. Sometimes, in an attempt by one to
carry out his/her functions efficiently, as a security officer, he/she may be at
143
CSS 243 Principles of Security Practice and Management
greater risk. This is resulting from the character of our society where one can be
persecuted for no just cause but because the person is doing his/her job well.
The mischief makers within the organization may look (or pray) for the fall of
such diligent officer. The criminals in the society who are bedeviled or prevented
by such diligent security officer(s) to continue their unlawful acts will also devise
methods to get back at or punish such good officer(s). Therefore, we will not be
wrong to say that experience of trauma can come from within and outside one’s
security organization.
Considering the challenges being faced in security career, and the susceptibility of
security personnel to traumatic experience, you may agree with me that our study
on Principles of Security Practice and Management cannot be complete without
looking on at least one of the ways we can manage trauma in security sector. In
performing this task, the writer will adapt one of his previous works on the
subject. Thank you as you pay great attention.
2.0 OBJECTIVES
The writer could remember the time he was seeking for employment in Nigeria
Police as Cadet Assistant Superintendent of Police, and a great number of his
family members as well as friends were against his decision to seek for
appointment in the police. Their fear was not basically about the hazards in
security occupation per se but reputation problem that bedevils police as a
secur ity institution in Nigeria
Nevertheless, the reputation crisis being suffered by Nigeria Police due to the
activities of bad eggs in that (important) institution has actually made police job
much more hazardous. A quite number of police personnel, in the course of
protecting people’s lives and property, have either been injured or killed by
criminals.
144
CSS 243 Principles of Security Practice and Management
Sadly, the society often feels no sympathy for the affected officers and men or
their families. The reason may be the evils, which society has also suffered in the
hands of Police, especially during the dark days of military regimes when it (the
police) was used to do all sorts of dirty job for the military tyrants. The activities
of the bad eggs in the police have also worsened the matter.
A situation like the foregoing can lead to trauma among security personnel
working in an institution that experience public resentment like Nigeria Police.
Thus, traumatic experience usually accentuates psychological disorder and shocks
with attendant mental problems or irrational feelings among the victims.
However, those of them that are not lucky to survive the hazards test (those
harmed) may begin to experience a number of traumatic symptoms. And the
intensity and duration of the disorder also determine the level of their traumatic
attitude. Stress reactions will definitely surface ranging from general feelings of
confusion and fear to more specific symptoms of sadness, guilt, anger, depression,
anxiety and social withdrawal. In a situation where the traumatic experience
becomes very severe, symptoms can group together to form a condition known as
Acute Stress Disorder (ASD). If such symptoms are still being experienced within
the first four weeks, then there is Post-Traumatic Stress Disorder (PTSD) These
conditions require professional assistance and treatment.
Several factors can lead to trauma in security occupation. The death of a beloved
one(s) can lead to trauma especially if the death of such person(s) has a link with
the job of the security officer. A good example was the case of a police officer
working in the Special Anti-Robbery Squad in one of the Area Commands in
Lagos. The man was very brave and he had led his team to make a number of
arrests of armed robbery suspects in the state.
The officer’s diligence and commitment to his duties later made him the most
wanted man on the list(s) of several criminal gangs within and outside his area of
operation. Several attempts were made to get him assassinated but all failed. The
man never allowed threats to his life by some hoodlums deter him from doing his
job.
When it was clear to the hoodlums that the officer was a hard nut very difficult to
crack, the attention of some of the hoodlums shifted towards his family. Sadly, the
wife and children of the poor officer were massacred by the criminals. There is no
145
CSS 243 Principles of Security Practice and Management
doubt that a situation like this can lead one to a great trauma. What can be more
traumatic than losing one’s entire family overnight just because one is doing
his/her job.
Economic and socio-political factors can also play a great role in manufacturing
or producing stress and traumatic disorder among security personnel. It is quite
unfortunate, owing to the risks that underlie security profession, security
personnel both in public and private sectors are extremely underpaid compared to
their counterparts in developed countries. Getting far less than the task one is
performing as a security employee in economic terms, can create a sense of
frustration that may quite lead to trauma.
The incidence of set-up is not alien to security profession. Setting-up a person can
come in different ways including creating artificial secur ity loopholes, hiring of
(external) individual(s) or group(s) of individuals to lie or give false witness
against a person, being trapped with money, among others. Set-up may come
from one’s subordinates, colleagues, superiors in the same security organization
or external forces. the external forces may include friend(s), clients, mischief
makers where one is posted to work, former lovers who feel jilted, etc.
If a person is set-up, and he/she is being told to face a disciplinary panel, one
thing that is sure is that the person will feel sad about the allegation leveled
against him/her. The possibility that such person will be let-off the hook is a
subject of chance. He/she may be lucky to be exonerated, and it is also possible
that sentence of guilt may be passed on him/ her.
Exercise
Describe traumatic disorder in security profession.
War/torture
Animal Bites and attacks
Assaults
Earthquakes
Falls
Fire
146
CSS 243 Principles of Security Practice and Management
Shock
- Victim is likely to be doubtful of the reality of the activating event like rape,
injury etc that propelled the traumatic experience.
Fear
- Victim feels that such crime can still be perpetrated against him/her again -
147
CSS 243 Principles of Security Practice and Management
- When the situation is not checked, the victim may become mentally ill.
Anger
- Victim is displeased with the injustice and harm perpetrated against him/her.
Sadness
- Victim feels dejected as he/she is full of pains agonies about the crime or
offence.
- Victim losses faith in the immediate environment where the harm was
perpetuated.
- Victim always feel grievous about the past crimes and losses.
- Crying will definitely rent the air where trauma-induced harm or crime is
carried-out.
Shame
Need
- Victim always desires for public appreciation of their traumatic experience and
acknowledgment of the crime by the offender.
148
CSS 243 Principles of Security Practice and Management
- Victim hates loneliness and such loneliness will further aggravate their
conditions.
Guilt
- Patient may have a feeling of being responsible for the trauma by refusing to
do the right things at the right time, which may be the factor responsible for the
ills that he/she and/or other persons suffer. An example of this is a trigger happy
security employee who deliberately or accidentally killed an innocent civilian.
The security team rather telling the truth can decide to cover-up to save their
erring colleague from punishment. It is possible that such erring security
employee or any other member(s) of his team that had the knowledge of the ugly
incident will start having bad dreams and nightmares about the dead.
Exercise
Explain the emotional effects of trauma.
Traumatic events like rape, murder, natural disaster, war-making and participation
in armed hostility, losing beloved one(s), false accusations etc are capable of
having some adverse effects on person(s). In ensuring the wellbeing of security
personnel, it is important to put in place viable framework through which any
experience of trauma by any of them can be managed.
This psychotherapy was developed by Albert Ellis who was born into a Jewish
family in Pittsburgh, Pennsylvania in 1913. His (Ellis’) development of REBT
was influenced by Stoic mythology. In Ancient Greece, the Stoics were of the
belief that our actions are not basically the product of the event we faced or
passed through but our interpretation or perception of what we experienced.
149
CSS 243 Principles of Security Practice and Management
Rational Emotive Behaviour Therapy assumes that human being has capacities for
both rational or straight thinking and irrational or tricky thinking. Human being is
naturally endowed also with self preservation, happiness, thinking and
verbalizing, loving, sharing, growth and self actualization. The human being in
his/her freedom of will also possesses the powers to engage himself/herself in
negative actions-self destruction, avoidance of thought, procrastination, self-
blame and avoidance of fulfilling growth imperatives. So, let us now state the
basic assumptions of REBT one by one, to stimulate our better understanding of
the subject matter.
(a) Man causes himself/herself to undergo any traumatic experience he/she may
be through, rather than influence from external source (s);
(b) Man possesses the biological and cultural capabilities that allow him/her to
choose his/her course of actions and thought-direction (choice of doing right or
wrong);
(c) Man is capable of creating unnecessary beliefs that can subject him/her to
emotional disturbance;
(d) One unique quality of man is that he/she is capable of determining the course
of his/her cognitive, emotional and behavioural processes anytime, anywhere and
in whatever circumstances. Man can decide to be less anxious or disturbed about
events around him/her, if he/she has a strong desire to do so;
(e) Man is also self-talking, self-evaluating and self-sustaining. They often react
to their desires- they sometimes behave funny; and
(f) Man, by nature always aspires for success (growth) and actualization of
his/her dreams.
Again, according to REBT, man may adopt negative strategies in fulfilling his/her
ambitions (aspiration(s) while putting into play his/her crooked artistry to
outsmart any fellow man, if he/she perceives any stumbling block in (the)
realization of his/her ambition or in meeting his needs. REBT is a very good
150
CSS 243 Principles of Security Practice and Management
healing and anger management technique. REBT affirms that the feelings and
thought should be main points of focus by any therapist. See. Figure 2.1.
FIG. 2.1
Rational Emotive Behaviour Therapy Intervention
A B C
Counselling Intervention
D
Emotional Change
F
Healing
E
A – Activating Event.
B -- Belief / Irrational thoughts.
C - Consequences / Emotional disturbances.
D - Disputing (detecting, debating and discriminating)
E - Effective Philosophy.
F - A new set of feelings.
The activating event can be unemployment, loss of job, divorce, false allegation,
poor working condition(s), sexual assault, electric shock, dejection, conflict, non-
promotion, demotion, exam failure, loss of beloved one(s) and/or colleagues,
among others. This activating event has great impact on the affected person or
victim of such circumstance(s).
The rational or irrational ideas or thought(s) of the affected person determines the
emotional consequences which the affected person will face. For instance, the
security personnel who get injured in the course of engaging some criminals in
shoot-outs, and the injuries sustained lead them to permanent disability. Such
security employees will find it difficult to live a happy life again. There is the
likelihood that such people will experience more traumas in societies like Nigeria
where security employers (i.e. government) give less attention to the wellbeing of
their staff.
REBT makes us to understand that it is not the event itself that causes emotional
disturbances or trauma but rather, it is our irrational thought. Therapist is however
expected to adopt some scientific strategies to assist the client to overcome the
151
CSS 243 Principles of Security Practice and Management
challenges faced by the client resulting from his/her irrational beliefs. Thus, the
therapist will intend to achieve through:
(a) detecting: Here, the client is guided on how to detect his/her irrational beliefs;
(b) debating: After the therapist’s guidance and support for the client to detect
his/her irrational beliefs, the client should be allowed to debate his/her
dysfunctional beliefs by subjecting them to logical and empirical inquiry and
through this he/she (client) can free himself/herself from the crutches of irrational
thoughts and beliefs ; and
(c) discriminating: Here, the client must have learnt how to discriminate irrational
beliefs as he/she separates irrational beliefs from the rational ones.
After the disputing process (es), the client is expected to arrive at E where he/she
appropriates an effective and rational philosophy, which denounces irrational
beliefs. Through this, the client will arrive at F where he/she develops a new set
of feelings which produce healing, happiness, love, joy and self–satisfaction.
Therapeutic Strategies
(a) Disputing
The therapist assists the clients stem down the negative influence of their
thoughts, making them to know that their emotional problems are not hinged on
the activating events but rather on their irrational belief and dysfunctional
thoughts.
(c) Humour
Client is led by the therapist on the need to deviate from taking things too
seriously. Here, humour is employed as a counter–trauma measure, which helps
the client in the development of new philosophy of life and discourages any
tendency that enhances over-flogging of issues, which may lead to emotional
152
CSS 243 Principles of Security Practice and Management
disturbances. The therapist should bring the traumatized person and other victims
of trauma together, and encourage them to sing humorously and trivialize their
ugly experience(s ).Through humour victims of trauma become less serious, their
experience will become less painful, and their anxiety and depression will become
less visible. This approach is quite viable in giving succor and more fulfilled life
to any security employee experiencing trauma due to its healing quality.
Exercise
Explain the importance of REBT in the management of trauma.
4.0 CONCLUSION
153
CSS 243 Principles of Security Practice and Management
5.0 SUMMARY
Ellis, Albert (2004), T.he Road to Tolerance: The Philosophy of Rational Emotive
Behavior Therapy, Prometheus Books.
.health.vic.gov.au/trauma/review99/1c1.htm
.traumamanagement.org/
Unit 5
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Public Relations
3.2 Relationship between Security Sector and Public Relations
154
CSS 243 Principles of Security Practice and Management
1.0 INTRODUCTION
The growing attention being given to public relations in recent time in the security
sector can be said to be a response to the reshaping of the security community.
The widening space created by traditional security system posed several
challenges and incapacitations to major players in this important sector. One of
the problems was the deepening crisis that existed between the security
community and the public.
The reason for this resentment is not far fetched. The colonizers created the
public security community to their interests only, and security personnel many of
whom were local people, were used to suppress the local public. The culture of
security management was basically to protect the interests of the colonial
authorities, which has since become the grand norm of security sector in post-
colonial Africa. The security continued to do the dirty job, they were
commissioned to do under the colonizers, for their new masters in post-colonial
Africa.
The antecedents of the security sector have created enmity between her and the
public. Since the end of the cold war, the security sector in developing countries
having been facing enormous challenges due to the dimension crime has taken.
The traditional coercion and deterrence techniques have failed to contain the
growing crime rate, insurgency, terrorism among other forms of violence being
perpetuated by individuals or group(s).
2.0 OBJECTIVES
155
CSS 243 Principles of Security Practice and Management
Public relations has been an age long concept. In traditional African societies, the
monarchs usually, according to the customs of the land(s), constituted council of
chiefs. The chiefs were assigned different functions but it was incumbent upon all
of them to project the good name of their communities as well as launder the
image of the monarchs. They performed this utmost task through the use of
several channels.
However, one of the ways was through the open-door policy they advanced. Such
attitude made the public (or villagers) form good impression about the
(traditional) leadership as not only being accessible but also accommodating.
Being accommodating in this context does not mean that the leadership would
always consider the views of their subjects but allowing them to freely express
their (followers) minds sometimes creates healing.
In modern time, the term public relations was made popular by Thomas Jefferson,
a former U.S. President when he was addressing the congress in 1807. But his
meaning of public relations centered more on policy than as a communication
process (see Stuart, 2007). Edward Bernays was one of the early scholars in the
field of public relations, and according to him, public relations can be described
as:
--------a management function which tabulates, defines the policies,
procedures and interest of an organization followed by executing a
program of action to earn public understanding and acceptance (quoted on
www.en.wikipedia.org/wiki/Public_relations).
156
CSS 243 Principles of Security Practice and Management
The purpose of security is to safeguard the state or client’s safety against any
internal and external threats. The metamorphosis of modern security community
cannot be complete, if the relationship between her and the public remains hostile.
The history of police and the military in Africa has not been pleasant.
Law enforcement agents are often seen in several quarters as anti-people due to
their subservient posture, always allowing themselves to be used by the ruling
elites to suppress the public they are meant to protect. The situation has remained
the same from the colonial era till the present.
Security agencies in developing countries have continued the dirty job for the
ruling class to continue to perpetuate themselves in office. In the case of
Zimbabwe, it’s unethical and barbaric the way the police and the military deal
with the opposition groups and their leaders. The way they conduct themselves do
not only show that they are anti-people but also partisan. The repressive attitude
of the law enforcement agents towards the public is absurd and contradictory
(harming people you are paid by the state to protect).
The foregoing attribute of law enforcement agencies in Africa and elsewhere has
created a structural hatred between the security community and public. The
identity crisis that also dominates their relationship has also worsened the matter.
The “We” and “they” dichotomy, element of the identity crisis, also explains why
there is huge communication gap between the two.
Even, within the security sector in Nigeria, there is the same dichotomy problem
between the military and police, which has led to cases of blood letting and
differentiation where the former sees the latter as civilian. To add salt on injury,
the police appears to be the most despised, of all the law enforcement agencies, by
the public in Nigeria.
Every security agency has some overall goals that it wants to attain. To meet
these goals, the security agency will need to create a friendly impression in the
minds of the people or clients. This is the reason why various corporate
organizations have a special unit for public relations.
Public relations will not only assist the security sector to build a friendly profile
but will also enable her to meet its overall (organizational) goals. If the basis of
security sector is to provide safety and security of lives and property, it therefore
needs the support of the public in accomplishing this aim. A good example is a
society where the security sector is criminalized, and to combat crime effectively,
there must be adequate provision of (vital) information to the security community.
157
CSS 243 Principles of Security Practice and Management
Here, you may agree with me that it’s quite imperative for the security sector to
ensure a harmonious communication relation between her and the public. It is not
surprising that in most places where the guerilla insurgents usually record success,
there is severed relation between the government and the people. In society
where public perception about the security sector is unfriendly, there is the
tendency that the public will cooperate with elements who are working toward
subverting the public order rather giving support to the security sector, which they
consider working (basically) for the interest of the rulers.
Any security organization that has bad reputation among the people should make
adequate efforts to change such impression, which portrays the organization as a
bad one. Public relations activity should be brought into play to change the
mindset of the people about such security organization, showing the public that
there is a good side of the organization, which the public is yet to know.
Moreover, the battered and negative image of the police in Nigeria has begun
improving for the better due to various public relations activities and programme
that the institution has embarked upon. The phrase “police is your friend”, which
has been an anthem in Nigeria, is basically designed by the police authorities to
change public attitude towards the organization and build a friendly reputation for
the institution.
Fortunately, the Nigeria police force has since recognized the need and at
present a formidable public relations department exists in the force. In this
department, officers work within a frame work that enables each one of
158
CSS 243 Principles of Security Practice and Management
It is not only Nigeria police that is aware of the strategic importance of public
relations in meeting their organizational goals. Various public security agencies
have also embarked on aggressive public relations activities. The aim is basically
to manage the relationship that exists between them and the public, such that
public attitudes towards them will not only be friendly but also beneficial to the
organization.
By 1953, the Nigeria police moved beyond its traditional public relations system
in which the PR activities could be carried out by any officer(s). It was that year,
the office of the Public Relations officer was established, which marked the
turning point in public relations management in Nigeria police. Though, at the
initial stage, the basic duty of the PRO was to oversee the welfare of the personnel
in the force.
Later, the tasks to be performed by the PRO increased, and included planning and
managing the relations between the force and public particularly as it concerned
communication. The office of the Police PRO was not replicated in various
regions of the federation until 1964 when the Inspector-General of Police, Mr.
Louis Edet ordered the establishment of the position of public relations officer in
the capital of each of the regions (Enugu, Ibadan, Benin and Kaduna) while the
one in Lagos had already been in existence.
Due to the new political development at that time, regions were replaced with
states under the military government led by General Yakubu Gowon. That
development led to increase in the number of Police Public Relations officers at
the state level. The situation has remained the same up till now. The office of the
public Relations Officer exists in each of the 36 states of the federation and the
FCT (Abuja). These officers have their offices at various state commands while
the Chief PRO of the force is in the Nigeria Police Headquarters in the FCT
Abuja. The police PRO in the state (command) level and the force PRO at the
Police Headquarters must be officer not below the rank of Assistant
Superintendent of Police, and an Assistant Police Commissioner respectively.
Nonetheless, the art of public relations in recent time has been extended beyond
its traditional approaches through which communication was built for mutual
benefits of the security organization(s) and the public. The modern
communication technologies and sophisticated information mechanisms have
really affected public relations practice in security sector and elsewhere.
159
CSS 243 Principles of Security Practice and Management
search approach, people now search for information about any security
organization electronically especially through the use of internet. Many
newspapers have gone electronic, which affords one an opportunity to read the
dailies through the internet rather than looking for newspapers vendor(s).
By and large, public relations can play a great role in the management of security,
and for that singular reason, many security organizations have taken PR activities
so seriously. Again, security organizations are now beginning to appreciate the
importance of creating good image and friendly relationship with the public. In
managing (effectively) their public relations, a number of approaches are
considered. It is these approaches that we shall be focusing on, in the subsequent
segment of this unit.
Exercise
How do you describe the relationship between security sector and public relations
in the management of security?
There are several approaches adopted by security sector to do its public relations
task. In spite of the “closed system” philosophy being operated in security sector,
various security organizations still realize the need to ensure public awareness
about their activities, and also to seek collaborative partnership with the public for
mutual benefits.
Public relations activity usually begins with effective planning. That is the reason
why it is necessary to have qualified people as public relations officers. But how
do we identify people who are qualified? Should we appoint people into PR
position based on their academic qualifications in public relations and related
field like Journalism and Communication Arts? Or should we basically consider
the experience of the prospective candidates in public relations rather than their
academic qualifications? These questions and more will come to our minds when
we discuss the issue of appointing people into public relations positions in any
security organization.
Most times, during the recruitment exercise, none of the public security
organizations actually shortlists any particular candidates for public relations.
May be, the idea is that any officer can perform the task of public relations.
Knowing that there is a lacuna to be filled in the management of public relations, I
presume, is responsible for the use of external public relations experts by law
enforcement agencies in Nigeria, to help in laundering their image. Nevertheless,
security sector does not rely on a single PR approach but considers a quite number
of approaches in the management of PR activity. These approaches include:
(a) Audience Targeting: The main targeted audience of the security sector is
the
160
CSS 243 Principles of Security Practice and Management
public. It will be mischievous to say that all the people in a given society belong
to the same public. This is because every society is stratified, and people don’t
belong to the same class. Therefore, in targeting the audience, there is need to
identify which of the publics we design a particular PR activity for. Within the
context of opinion making, there are three basic forms of public: the decision
making (e.g. party chieftains, etc), attentive (e.g. human rights activists, security
consultants, academics etc), and the mass public (i.e. those who are phlegmatic or
lukewarm or non-active in opinion making process.
Apart from the general public relations designed for the generality of people in
the society, security organizations should also endeavour to segmentalize the
audience in such a way that it can provide opportunity in attaining the
organizational goals. By doing this, you will also be able to tailor each message
in such a way that it will be appealing to each audience target.
(b) The Use of Lobby Groups: Using lobby groups is another approach of
public relations, which enables the security sector to influence the opinions of the
people. Lobby groups as interest groups don’t only help to influence the opinion
of the public but also persuade the government in decision making. Several Non
Governmental Organizations have really helped to launder the image of the
Nigeria police in recent time by sensitizing the public on the need to cooperate
with the force;
The police PRO will also go further to (deceptively) inform the public that most
of the people collecting N20 on the roads are not likely to be members of the
Nigerian Police. The point is that the police authorities are aware that some bad
eggs in the police are really perpetuating the shameful act of collecting N20 but in
building a good reputation, the authorities may decide to deny the allegation.
This is the act of spinning.
161
CSS 243 Principles of Security Practice and Management
Spin also includes the act of cherry picking, which means a method of selecting,
facts and quotes to buttress one’s argument. This assists in drawing the attention
of the people away from issues or events that are considered capable of putting
the name or image of the security organization in disrepute. Whenever the public
accuse the police of non-performance, the next day, you will see police patrolling
some suspects in the media, most of whom usually claim innocence of the
allegations leveled against them by the police.
Though, in most cases the action of the police is genuine, because periodic patrol
of suspects in its nets before the public is a regular routine in Nigeria Police.
Occasionally, the police use diversionary techniques to draw the attention of the
public from the news that can damage the reputation of the institution. This act is
also exemplified in the Nigerian Army, if the force is alleged of sending some of
its men to disrupt peace in a neighbourhood, what you will hear the authorities (of
the Army) say is that those people that invaded the place in question are
“unknown soldiers”.
Knowing the damaging effects that actions taken by some members of a security
organization on the reputation and the image of the organization, spin is usually
adopted by denying the allegation(s), not basically to allow the culprits go
unpunished but to protect the name of the organization. Later, there may be in-
house investigation into the matter as it is done in the police and elsewhere to
punish the culprits. But authorities of the security organization will first adopt the
principle of “non-denial denial” to avoid negative public perception about their
organization(s);
(d) Talk show Circuit: Security sector especially the police in recent time make
use of several talk shows to project the good image of their organization, sensitize
the public on security and safety, getting response from the public in the form of
questions, suggestions, commendation etc. This approach also enables the security
sector to get (useful) information from the public;
162
CSS 243 Principles of Security Practice and Management
(g) The Books: Security organization can carry-out laudable public relations
activity through writing of books, which explain its operations, its mission and
goals. The books may also show how the security organization aims to
accomplish her overall goals for the mutual benefits of the public and her. If the
public is aware that it is also going to benefit from the success of any security
organization, it will definitely arouse her interest in such organization;
(i) The use of seminars, publicity events, mass media, personnel approaches,
among others can be very useful in the management of public relations by any
security organization.
Exercise
Discuss approaches to public relations.
4.0 CONCLUSION
Through the public, security organizations get vital information, which can help
them to meet their organizational goals. Therefore, there is need for security
organizations to take public relations activities seriously. In fulfilling public
relations task(s), a number of approaches can be considered. A single approach
cannot be sufficient, and it is pertinent to adopt a variety of approaches.
5.0 SUMMARY
In this unit, we have been able to demonstrate the great roles that public relations
plays in security management. First, to provide ourselves with conceptual energy,
we defined the term public relation, knowing that by doing so, other areas of
discourse could have meaning to us. We also explained the relationship between
security sector and public relations. Thereafter, we drew our attention on various
163
CSS 243 Principles of Security Practice and Management
approaches that can be adopted by security sector in the conduct and management
of its public relation. Thank you very much for your attention.
Center, Allen H. and Jackson, Patrick (1995), Public Relations Practices, 5th
Edition, Upper Saddle, N.J: Prentice Hall.
Cutlip, Scott M., Allen H. Center & Glen M. Broom (1994), Effective Public
Relations, 7th Edition, Englewood Cliffs, N.J.: Prentice-Hall, Inc. A Simon and
Schuster Company.
Ewen, Stuart (1996), PR! A Social History of Spin, New York: BasicBooks.
Okere, Ethelbert (1991), Nigeria: Agenda for A Modern Police Force, Lagos:
New Concept Media Limited.
Seib, Patrick and Fitzpatrick, Kathy (1995), Public Relations Ethics, Fort Worth:
Harcourt Brace and Company.
Wilcox, D.L., Ault, P.H., Agee, W.K., & Cameron, G. (2002), Public Relations
Strategies and Tactics, 7th Edition, Boston, MA: Allyn & Bacon.
164
CSS 243 Principles of Security Practice and Management
MODULE 4
Unit 1
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Defining Operations Management
3.2 Principles of Operational Management
3.3 Capacity Planning in Security Sector
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Security business involves a wide range of issues and activities. Security includes
providing services for safety and protection of life and property of the
customer(s). In the context of public security sector, the customers are the people
while private security outfits deliver their services to their private customers.
165
CSS 243 Principles of Security Practice and Management
2.0 OBJECTIVES
166
CSS 243 Principles of Security Practice and Management
For any security outfit to attain its organizational goals, there must be effective
operational management system that ensures functionality in planning and
operational control and capacity-building.
Exercise
Define the term operational management.
Planning
There is a popular saying which goes thus “those who fail to plan, plan to fail”.
This aphorism forms an essential element of the philosophy of security practice.
Even, considering the nature of security business, you may agree with me that
planning is crucial to security operations. Every security task must be planned
well before implementation.
However, it is wrong to send police personnel who don’t know how to swim to go
and maintain security and order in a riverine society. If the Nigeria Police does
not have enough personnel that can swim well, it is therefore necessary to send
many of its men and officers on a course in swimming. It is by doing this that the
drowning of security personnel drafted to the area can be reduced drastically.
167
CSS 243 Principles of Security Practice and Management
There should be framework which will assist in profiling the existing risks and
those that can emerge later, to provide consistent safeguarding measures to guide
operations. This principle appears to be lacking in the operations of most law
enforcement agencies in Nigeria. The Nigeria Police’s failure to regularly conduct
risk assessment is responsible for its ineffective risk management.
Many of our policemen and officers have been killed through surprise attacks
from hoodlums. In the United States and other developed nations, police
personnel are adequately kitted by the government while virtually all of them are
given bullet-proof vests. The rationale behind such idea is to equip the security
personnel against any unexpected attack. Therefore, it is pertinent for security
organization to observe regular risk management.
Risk management in security sector actually includes such activities like Threat
and Risk Assessments, Privacy Impact Assessments, security investigations,
Vulnerability Assessments, self-assessments among others.
Operational Personnel
All these units have various operational assignments. For instance in the Nigeria
Police, there is Special Anti-Robbery squad fondly known as SARS. The basic
task to be performed by this unit is to make arrests and check the activities of
armed robbers within their respective jurisdictions. Some of the tasks performed
by operational personnel may include the following:
i. Observing security procedures and suggest measures that can be taken to improve
those procedures;
168
CSS 243 Principles of Security Practice and Management
Incident Management
There is growing awareness among the security experts on the need to conduct on
regular basis vulnerability test on its operations. Through vulnerability
assessment, security organization will be able to discover possible threats. After
identifying the possible threats, the next step will be to fathom ways to address
the problem.
169
CSS 243 Principles of Security Practice and Management
Division of Responsibilities
If a task is performed by only one individual, there is possibility that enemy will
unleash threat on the system, even without being aware. It is even easier to buy an
individual within a system than a whole group of people.
Exercise
Explain the principles of operational management in security sector.
This is because if adequate capacity is not built to meet the growing demands of
the custormers, there is likelihood that the security organization will experience
inefficiency in its operations. The growing incidence of security threat in Nigeria
and the inability of the law enforcement agents to arrest the situation has brought
a wide spectrum of criticisms about the competence and efficiency of the public
security agencies.
The main purpose of capacility planning is to address any deiscrepancy that may
emerge resulting from the growing demands of security services from the
custormers. Considering the increasing security threat in Nigeria, there is need for
capacity planning.
170
CSS 243 Principles of Security Practice and Management
Exercise
How do we carry out capacity planning in security sector?
4.0 CONCLUSION
Operational management and capacity planning are very crucial to the production
of goods and services. The goods and services within the security context are
different from the ones provided in non-security organizations. Some of the tasks
or functions performed by security personnel may include protecting the lives and
property of their employers’ customers, putting in place safety measures,
responding rapidly to emergency situations, management of disasters, counter
insurgency, policing, defence planning and management, intelligence reporting
for policy formulation among others.
5.0 SUMMARY
In this unit, our attention was drawn to the relationship between operational
management and effective securioty management on one hand, and the impact of
capacity planning on the operational service delivery on the other. We bagan our
task in this unit by looking at some of the definitions of the term operational
management. Thereafter, we explained various principles of operational
171
CSS 243 Principles of Security Practice and Management
management. The third and last area of discourse was capacity planning in
security sector. Thank you for your attention.
172
CSS 243 Principles of Security Practice and Management
Unit 2
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Meaning of Asymmetric Aggression
3.2 Features of Asymmetric Aggression
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
When going into war with Iraq, the US and allies could not have believed that the
greater military challenge would come from dissidents rather than the regular
troops of the Iraqi government under Saddam. Asymmetric aggression has been of
great concern in international politics. It permeates every level of conflict ranging
from international war to intra-state insurgency. In this unit, we shall focus on the
asymmetric aggression and tactical impact on strategic planning and security
management. I have no doubt that you will find this unit very interesting. So,
fasten you seat belt!
2.0 OBJECTIVES
173
CSS 243 Principles of Security Practice and Management
This is instructive in the leadership role being played by Nigeria, not as a black
nation per se but as a regional power, which every African nation looks up to. Are
we to consider its (Nigeria’s) contribution to the anti-colonial struggle on the
continent of Africa? or the amount it contributes both in human and material
terms towards keeping peace in Africa? or the leading role it plays in the
popularization of African culture? or its kind gestures to sister nations who are in
needs both in financial, technical, spiritual and cooperative terms?
It is important to note here that it is not only the military superiority that
determines the status of a country in relation to any other nation(s). It is just one
of the elements that determine the weight a nation possesses among the comity of
nations. For instance when we talk about consistency of African nations as
regards stable experience of democratic governance to allocate power and
international influence to nations on the continent, Nigeria cannot be among the
ten leading countries due to its checkered history of military rule.
174
CSS 243 Principles of Security Practice and Management
Here, what we mean is that the former is weaker than the latter either in quality
and quantity in terms of military capability and mobility, or even in both
variables. What we should note here is that the recent experience in the modern
warfare has shown that population (quantity) is a determinant of military power
relations in international po litics. And military technological advancement as well
as trained military personnel with sound advantage in military strategy (quality)
can even play more prominent role in the determination of a country’s status in
international military power equilibrium. An example is China and the US where
the former enjoys population advantage while the other enjoys military superiority
in terms of technology and mobility.
This view dominated the violent proceedings that characterized the Korean War
where the US and its allies through the backing of the United Nations supported
the South Korea while China gave its military support to North Korea. Here, the
population of China played a very critical role, which forced the US and its allies
to sue for peace in the affected peninsula. It was a ceasefire arrangement that
temporarily ended the war, even till present.
Meanwhile, these insurgents launch their offensives with small arms and light
weapons like Qassam rockets on Israeli targets, both civilian and military. On the
other hand, Israel has a standing (professional) army or military, which also
attacks the military and civilian formations in the Palestinian region. What is
important here is that the Palestinian insurgents usually engage the State of Israel
in violent hostilities through unconventional and asymmetric methods like suicide
bombing, ‘hit and run’ strategy and other guerilla approaches.
175
CSS 243 Principles of Security Practice and Management
Middle-East and the Israeli persecution of the Palestinians and the entire Arab
race.
Again, these insurgents are not in any way members of the Lebanese Armed
Forces, yet they waged an international war against Israel in 2006 with high
casualty rate from the side of Israel. They fired Katyusha rockets persistently into
Israel and also engaged the Israeli forces in open and conventional battles, which
forced Israel to adopt air raids, hitting some targets (incidentally, civilian
locations suffered more from the aerial bombings by Israel ) in Lebanon. On the
battlefield, Israel suffered a military fiasco in the hands of the Hezbollah
militants, which forced Israel to change its war strategies.
Moreover, military theorists have now articulated the need to widen or broaden
the conceptual meaning of asymmetric aggression or warfare to include a military
situation where two combatant-parties who possess unequal power relate and
endeavor to take advantage of their opponents' weaknesses. This interaction often
involves strategies and tactics outside the boundaries of conventional warfare.
The heart of this grand design is that "weaker" combatants will strive to use
strategy to make up for the deficiencies (in quantity or quality) it has. As we have
mentioned in the early part of this unit, the outcome of aggression is often
determined by quality and quantity of belligerent forces or the parties. One of the
parties may be mindful of the consequences of the violence and its cost.
Thus, one of the parties, after weighing the strength and weakness, gains and
losses that it is likely to derive from the aggression, a new strategy may be
adopted. A good example was the military offensive perpetuated against the
Nigerian forces on the Bakassi Peninsula by Cameroon. In 1981, Cameroon
launched an offensive against the Nigerian forces on the peninsula where five
Nigerian soldiers were killed while three other sustained serious injury (Day,
1982:97).
However, Cameroon later had a deep thought about its military offensive against
Nigeria, considering the asymmetric relation that dominated the power attributes
between her and Nigeria (a stronger party) and the consequences she may face in
the outcome of any eventual outbreak of conventional war. Cameroon had to
change its strategy to win the possession of the disputed peninsula from the
military campaign to legal combat at The Hague, which worked in her favour
consequent on the ICJ ruling on 10th October, 2002 (Kasali, 2003: 78-83)
Exercise
Describe asymmetric warfare.
(a) If the lesser party finds itself in a position of self-defense. And where its rights
176
CSS 243 Principles of Security Practice and Management
are (or about to be) abused or its territorial sovereignty is being undermined by a
superior-imperial party, the weak party is more likely to adopt unconventional
tactics to defend itself. A good example was the activities of local insurgents in
Iraq against the US led Coalition forces. In the mid-July, General John Abizaid,
Commander of the US-Central Command (USCENTCOM), described the
volcanic violence that greeted the post-war Iraq as a guerilla war. According to
him:
(we are) picking up a lot of information that indicated that there were
significant terrorist groups and activities that we were having to be
concerned about, as well; most of all happening in what we call the
Sunni Triangle, that area vaguely described by Tikrit, Ramadi, Baghdad,
but often stretching up into Mosul.
The local dissidents particularly Republican Guards that worked under Saddam
felt that the military superiority of the US and its allies could not be matched by
them considering the casualty rate of the Saddam army in the face of military
assault by the US led coalition forces on the battlefield. Thus, new tactic was
adopted by the local insurgents to continue the violent hostilities against the
coalition forces in Iraq.
Nevertheless, one would have thought that the capture of Saddam would mark the
end of the war, but even after the death of Saddam, the post war violence in Iraq
has claimed more lives in the ranks of the US army than recorded in the
conventional or open war that took place earlier. Pervasive insecurity has
dominated the entire post Saddam Iraq.
Guerilla strategy was adopted by the local dissidents particularly the Sunni
insurgents who have succeeded to reduce drastically the anticipated military
success of the US led Coalition forces in the jingoist invasion of Iraq under the
pretext of waging war against the development of weapons of mass destruction by
Saddam Hussein regime, in which the allegation has proved to be false. The local
insurgents have continued to protest militarily against the continued presence of
the US led Coalition forces in their country (Iraq), which they regard as a slap on
Arab nationalism.
The Sunnis who were favoured by the Saddam regime are disfavoured by the new
American arrangement and construction in Iraq, and the death of Saddam Hussein
177
CSS 243 Principles of Security Practice and Management
in the hands of gallows-men in the name of justice was like adding salt on an
injury. The event precipitated a violent relations not only between the Saddam
sympathizers and the US led Coalition forces but had also overblown the violent
hostilities between the Sunni and Shiite Muslim blocs in the country.
It is quite imperative to note that the former has the larger followership in the
Muslim world than the later. Many Arab-Muslim countries detest the latter based
on ideological assumptions and religious philosophy. Meanwhile, the latter enjoys
more popular support in Iran than elsewhere. This is evident in the support the
Sunni insurgents are enjoying in the Middle-East in their violent articulations.
(b) Another feature that dominates asymmetric warfare is that one of the warring
parties has a significant amount of technological advantage over the other, where
party A uses its technological advantage to offset any numerical advantage that
the enemy-party might be enjoying. For example, the vast numerical superiority
of the Chinese forces dur ing their initial involvement in the Korean War weighed
down the technological superiority of the United Nations forces.
(c)The use of terrain also features in asymmetric warfare. Terrain can be used as a
force multiplier by the smaller force and as a force inhibitor against the larger
force. Difficult terrain can be great obstacle to any military campaign by (strong)
party against the other (weak) party that is more familiar with the terrain where
the armed confrontations is taking place. This is evident in the problem, the US
faced in the Vietnam War and presently in Afghanistan where the Taliban still
engage the US and its allies in a guerilla battle. The terrain of any country can
serve as an opportunity to a weak party and to the disadvantage of the strong
party.
(d) Training and tactics as well as technology can prove decisive and allow
smaller forces to overcome forces much larger than they are. Training and tactics
play very important roles in any military operations. For instance, the British
soldiers are not so many but they enjoy adequate training and have tactical
advantage more than virtually all the great powers in the world today. This is
instructive, in the change of strategy in the prosecution of Iraq invasion by the
Coalition forces in 2003 where the coalition met strong resistant soldiers from the
side of Iraq, which almost broke the military hegemony of the Coalition forces on
the (ground) battlefield, but the British tactical superiority saved the day for the
Coalition forces.
The war in Iraq confirmed the importance of training, tactics and technology in
the determination of success in conventional wars. After the liquidation of
Saddam’s draconian regime in 2003 due to the defeat of his army, Saddam went
into hiding. The remnants of his Gestapo and Guards removed their uniforms and
blended with the civilian population to escape the military offensives of the
coalition forces, which had already occupied the territory of Iraq. The dimension
of the military campaign by the coalition forces was phenomenal, such that:
178
CSS 243 Principles of Security Practice and Management
the importance of speed, and the ability to get inside the enemy’s decision
cycle and strike before he is able to mount a coherent defense.
However, the war in Iraq moved into a different form of asymmetric aggression
where the coalition's use of superior conventional warfare training, tactics and
technology were of much less relevance in the prevailing post-war atmosphere.
The Coalition forces particularly from the side of the US troops, almost on daily
basis, face a huge military challenge from the various insurgent groups
particularly the Shiites. Indeed, the Iraqi insurgents have become increasingly
sophisticated, with fatal consequences on the Iraqi civilians and coalition troops.
(e) Tactics that are usually adopted by weak parties in Guerrilla warfare are often
used in asymmetrical aggression. In both cases, the forces and/or law enforcement
agents may need the support of a cooperating population that is ready to supply
useful information and intelligence about the difficult terrain for cover and
escape.
According to Mao Zedong the guerrilla forces must move amongst the people as a
fish swims in the sea. The population and terrain are often well-known to local
forces, who can use both to escape reprisal from conventional forces. A number
of insurgent groups in the Niger Delta region of Nigeria often use this tactic to
undermine counter-insurgency tactics of the government forces.
179
CSS 243 Principles of Security Practice and Management
on the greater power's abstaining from similar tactics. For example, the Law of
land warfare forbids the use of a flag of truce or clearly-marked medical vehicles
as cover for an attack or ambush, but an asymmetric combatant using this
prohibited tactic depends on the superior power's obedience to the corresponding
law.
Similarly, laws of war bars fighters from using civilian settlements, populations or
facilities as military bases. But when a weak party uses this tactic, the justification
for such tactic will depend largely on whether the other (strong) is also culpable
of such unlawful and criminal tactic.
Exercise
How do you describe features of asymmetric warfare?
4.0 CONCLUSION
Similarly, this tactic was also adopted by nationalist insurgents in Angola, Guinea
Bissau, Mozambique among others in their anti-colonial struggles. In post
colonial Africa, asymmetric aggression is still experienced particularly in intra-
state armed conflict or civil war where the rebels or perhaps the so-called
marginalized people take to arms against the government and its forces. The
examples include the UNITA rebels vs. MPLA-Government in Angola; LURDS
Rebels vs. Government in Uganda; among others. The violent activities of the
ANC during the apartheid regime in South Africa were a true reflection of
asymmetric aggression between the ANC insurgents and the apartheid
government.
5.0 SUMMARY
In this unit, we have been able to discuss extensively on the concept and practice
of asymmetric aggression. Our discussion illuminates on the concept of
asymmetry as a tactic in modern conflict and its impact on (inter)national
security. We however began our discussion in this unit by describing asymmetric
aggression. We also examined various features of asymmetric aggression.
180
CSS 243 Principles of Security Practice and Management
Arreguin-Toft, Ivan (2005), How the Weak Win Wars: A Theory of Asymmetric
Conflict, Cambridge: Cambridge University Press.
Cordesman, Anthony H (2003), The Iraq War: Strategy, Tactics and Military
Lessons, Washington DC: Centre for Strategic and International Studies (CSIS).
Poole, H. John (2004), Tactics of the Crescent Moon: Militant Muslim Combat
Methods, Emerald Isle, NC: Posterity Press.
Mack, Andrew J.R. (1975), "Why Big Nations Lose Small Wars: The Politics of
Asymmetric Conflict", World Politics, Vol. 27, No. 2 (January).
Mackey, Robert R. (2004), The UnCivil War: Irregular Warfare in the Upper
South, 1861–1865. Norman, OK: University of Oklahoma Press.
181
CSS 243 Principles of Security Practice and Management
182
CSS 243 Principles of Security Practice and Management
Unit 3
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Meaning of Guerrilla Warfare
3.2 Tactics and strategy of Guerilla Warfare
3.3 Features of Guerrilla Warfare
3.4 Ethical Problems of Guerrilla Warfare
3.5 Counter-Guerrilla Tactics
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Guerrilla warfare is generally referred to low intensity war. The word guerrilla
was derived from a Spanish word guerra, meaning war. The word was coined in
Spain to describe the kind of resistant aggression against the French Empire under
Napoleon Bonaparte. Its meaning was broadened to mean any similar-scale armed
resistance.
By 1809, the guerrilla had become part of the English vocabulary, which basically
explained guerrilla warfare in terms of the fighters, not minding the tactics that
characterize its (guerrilla) operation. In this unit, our search light shall be centered
on the guerilla warfare, its impact on security and measures that can be taken to
counter it.
So, let us go to the next segment of this unit, the objectives the unit seeks to
achieve, to actually look at what the unit requires and its coverage areas. It is
quite imperative to know that, it is advisable for the student to engage
himself/herself in further reading because there is no way, we can exhaust all
aspects of the subject matter in this course material.
2.0 OBJECTIVES
183
CSS 243 Principles of Security Practice and Management
Thus, it is not surprising that the guerrilla tactic has been the most effective tactic
for Palestine, which has enabled it to enjoy international public attention and
sympathy on one hand, and military successes through their ‘hit and run’ tactic,
which has had huge adverse effect on the psychology of the Israeli civilians and
military formations. The people of Israel live in perpetual fear on daily basis,
boarding a bus, a visit to supermarket, sleeping at home, toasting a lady on the
street, attending a place of worship, going to school, even going to public toilet,
among others have become dangerous tasks in Israel because you don’t where,
when and how the Palestinian insurgents will strike.
Therefore, this violent strategy has made Israel very unsafe and which military
victory is greater than making your enemy to live, eat, drink, walk, sleep in
perpetual fear, where he becomes a victim of eternal trauma? The strategic
relevance that guerrilla warfare enjoys in breaking the ranks of the enemy-party
cannot be under-estimated. This view was shared by William Wordsworth, a Poet
as demonstrated in his pamphlet on the Convention of Cintra. According to him:
184
CSS 243 Principles of Security Practice and Management
The fighters may coalesce into groups for tactical purposes, but their general state
is dispersed. Such fighters cannot be "rounded up." They cannot be contained.
They are extremely difficult to "defeat" because they cannot be brought to battle
in significant numbers. The human and material cost that would be involved in
any attempt o destroy a significant number of them is prohibitive in every sense.
Mao Zedong’s work on guerrilla warfare has attracted global interest among the
war strategists. Mao explained the tactics adopted by the People’s Liberation
Army during the Chinese Civil War. According to him, guerrilla principles
involve a tactical system whereby (when):
Mao in his analysis also distinguished between Mobile Warfare (yundong zhan)
and Guerrilla Warfare (youji zhan), but they were part of an integrated continuum
aiming towards a final objective.
Exercise
What is guerilla warfare?
185
CSS 243 Principles of Security Practice and Management
During the Vietnam War, Maoist guerrilla tactic was optimally put into
application, and it proved very effective in decimating the enemy (US) troops.
Another was the war between the Boers and the British imperialists where
guerrilla tactics played prominent role in the war and to the advantage of the
former, as Britain was later forced to make some concessions.
Thereafter, in the second phase the insurgents will now adopt more violent
strategy by increasing attacks on government forces and essential public
facilities like the radio stations, communication facilities, official buildings like
the parliament building among others. The third phase assumes a new
dimension, where the tactics are somehow at variance to the asymmetric methods
that underlie guerilla warfare.
Here, the insurgents will go out to engage the government forces in an open and
conventional combat to seize cities, overthrow the government and take over the
mantle of leadership. But caution must be taken here, insurgents often times meet
serious resistance from the government forces as was evident in the fight between
the MPLA government forces and UNITA rebels led by Savimbi.
A) Operations
186
CSS 243 Principles of Security Practice and Management
and often captured weapons of the enemy, the guerrilla force can persistently
torment the enemy forces psychologically through its level of invisibility in the
conduct of violence. Through continual violent attack on the enemy force, it
decimates the ranks of the enemy and the guerrilla escapes with very low
casualties. More casualties are often more recorded on the side of the enemy camp
than the side of the guerilla fighters.
The guerrilla insurgents carry out their operations not only to achieve military
advantage but also to fulfil their political goals. They use violence to tell the
government or the enemy-camp of the need to make valuable concessions. They
also attack civilian targets in order to force the masses to take drastic measures
such as public demonstration, election, memoranda , and criticism to prevail on
their government to make concessions to the insurgents by suing for peace. A
good example was the terrorist attack that forced the citizens of Spain to prevail
on the home government to withdraw its troops from Iraq. Operations vary from
place to place. The issue of suicide bombing is peculiar to the Middle East. The
9/11 incident that took place in the United States is still very fresh in our memory
where commercial air bus became weapon of mass destruction. It was a suicide
mission by the guerrilla insurgents that piloted the planes.
B) Application of Terror
Sometimes, the use of terror can play an important role in guerrilla military
campaign. Terror has become a veritable tool to attract international attention and
sympathy towards the cause of the guerrilla fighters. For example, Niger-Delta of
Nigeria had never enjoyed huge local and international attention until the recent
eruption of guerrilla warfare in the region.
The insurgent youths of the region kill government forces and security agents,
engage in hijacking of oil facilities, blow up facilities, extort cash from targets,
intimidate the general population, and resort to other acts of economic sabotage in
an attempt to bring the marginalization of the region by successive
administrations to local and international attention.
187
CSS 243 Principles of Security Practice and Management
D) Population Support
Most times, guerrilla fighters usually build cordial relationship with the mass
public in particular. But this is not always the case, if the civil population is found
to be hostile. A friendly population is perhaps a great access to the guerrilla
fighters. They are likely to assist the insurgents not only financially, they also
assist in the provision of shelter, sexual partners (or wives), information among
others. A guerrilla force always strives to win the sympathy of the people because
people determine their success and their safety in the face of counter-insurgency
attack by the enemy force.
Thus, mass public remains the lifeline and engine room of any guerrilla
movement. If a civil population has a hostile and uncooperative attitude towards
the guerrilla fighters, it is a great challenge to the insurgents who endeavour to
win the support of the public at all cost, even it will need to adopt intimidation
strategy to win the masses support, the movement will not hesitate to do so.
E) Withdrawal
Guerrilla fighters always plan for escape in the conduct of their violence. They do
this strategic planning where they draw their withdrawal tactic after each
operation has been carried-out or when there is difficulty in perpetuating the
planned violent campaign. The stage of withdrawal is very critical in guerrilla
operation. Insurgents often get trapped by the enemy camp superior firepower,
and withdrawal tactic will determine the fate of the insurgent. Insurgents usually
have some withdrawal tactics that include mixing with the civilians, evidence-
cleanup, disguise or self-murder (in rare cases) among others.
F) Logistics
188
CSS 243 Principles of Security Practice and Management
G) Terrain
Terrain is also very important in guerrilla warfare. Most time, guerrilla fighters
prefer rural location as their abode where they usually retire after they have
conducted their operations usually in the cities or any other target locations. They
prefer places like thick forests, mountainous environment, and borders, which can
create a platform for the insurgents to have access to easy escape routes in case of
any surprise offensive from the enemy camp. Examples include the activities of
the Mujahadeen of Afghanistan against the Russians, the Taliban movement
against the coalition forces in the continuing war in the country. Similarly,
FRELIMO conducted a series of guerrilla attacks against the Portuguese colonial
authorities in Angola prior to independence in that country. The urban guerrilla
movements usually have the attitude of blending into the civil population.
More often than not, guerrilla groups get support from foreign countries or
organizations. They get foreign assistance in the form of soldiers, weapons,
sanctuary, or statements of sympathy. Foreign governments often give covert
assistance to the guerrillas, which can substantially increase the victory of the
insurgents. Foreign diplomatic support may bring the guerrilla cause to
international attention, putting pressure on local opponents to make concessions,
or garnering sympathetic support and material assistance.
Exercise
What are the features of Guerilla warfare?
A. Intimidation
189
CSS 243 Principles of Security Practice and Management
This attitude dominates the conduct of guerrilla warfare in Africa. Civil wars, may
also involve deliberate attacks by the belligerents against civilians, with both
guerrilla groups and organized armies committing atrocities. The UNITA rebels
did similar thing during the civil war in Angola till the death of its leader, Savimbi
in the hands of government forces. Savimbi-UNITA guerillas committed a lot of
atrocities against the innocent and armless civil population in that country ranging
from mutilation, arson, sexual slavery to murder.
C. Transferred Aggression
Guerrillas often direct their aggression against civilians when they see that the
enemy camp is too powerful for them to conquer or if the superior fails to bend or
make any concessions in spite of their (guerrilla’s) attacks on government targets.
Frustration may set in on the part of the insurgents. For instance, the insurgents in
Iraq when they are subdued by the superior firepower of the coalition force have
often resorted to direct their anger against the civil population. They go about
bombing civilian locations.
Article 44, sections 3 and 4 of the 1977 First Additional Protocol to the Geneva
Conventions, "relating to the Protection of Victims of International Armed
Conflicts", recognizes combatants either militia or regular soldiers by the virtue of
the nature of the conflict, as belligerents either in uniform or not, inasmuch as
they carry arms and weapons openly in the prosecution of military operations,
they are both accorded the same status in the international criminal law.
Guerrillas are barred by the Laws of War from conducting guerrilla offensives on
armless civilians but the situation has been that the insurgents pretend that the
Conventions on the Laws of War do not recognize them as military elements, and
as such their military activities are not subject to the Conventions.
The recent development in Uganda where the leadership of the Lord Resistance
Army (LRA) has been alleged to have committed war crime and they are to face
justice at the War Crime Tribunal. In Rwanda genocide, several civilians that
190
CSS 243 Principles of Security Practice and Management
participated in the dastardly act have been made to face justice both in the local
courts in Rwanda and at the International Criminal Court over various war
offences. Whether one is in uniform or not when perpetuating violence against
non-combatants, war crime is war crime.
The guerrilla movement can be very difficult to crush by any power either
superior or inferior. Its tactical methods and modes of operation perform the
magic. How can one kill an invisible enemy? It is pretty difficult! Nonetheless,
right from the 1950s, attempts have been made at developing a strategic
framework to contain the activities of guerrilla groups. Several scholars have
presented a plethora of principles in form of counter-insurgency warfare.
One of such noble and influential works was done by Sir Robert Thompson.
Thompson is a popular counter-insurgency expert in Malaysia. He offers some
measures, which can be taken to contain guerrilla insurrection. Thompson
however criticised extreme counter-insurgent attitude of state and non-state
actors, which have had great adverse consequences on innocent civilians, which
somehow has created opportunity to insurgents in winning the support of the civil
population both locally and internationally. He however charged the state or
superior party to always adopt moderate approach to counter-guerrilla warfare.
These measures include:
2. Concessions
3 Economy of force
191
CSS 243 Principles of Security Practice and Management
The counter-insurgent regime must carry out its counter guerrilla with some level
of decency. Total military violence should be avoided because such action has the
tendency to force the guerilla to adopt more destructive methods to retaliate the
government’s offensive. The security institutions should be people friendly, and
official brutality should be discouraged.
In a situation whereby the police cannot contain guerrilla harassment, the military
should be brought in to quell the crisis but should be made to discourage
recklessness from the side of government forces. The guerrilla structures should
be brought down and the insurgents should be subjected to hot pursuit in order to
reduce their ranks and put their operations in disarray.
5. Mobility
Mobility and aggressive small unit action is extremely important for the counter-
insurgent regime. Heavy formations must be lightened to aggressively locate,
pursue and fix insurgent units. The military formations should adopt holistic
approach in combating the guerrillas, through tactics like continual ground battle,
aerial bombardment, sea raids, border-combing, among others.
The security operatives should map out the conflict area like an "ink spot". This
area should therefore be divided into various parts and allocate each part its
priority. The parts with high priority index shall be given the greatest attention.
Then, the counter-insurgent party will then spread out its control of the conflict
area outward like an ink spot on a paper. The strategic implication of this action is
that in the process, the entire area will be combed and the insurgents will need to
run away.
192
CSS 243 Principles of Security Practice and Management
9. Foreign assistance
Exercise
Explain any five ways to check guerilla warfare.
4.0 CONCLUSION
Guerrilla warfare has remained a very unique form of warfare in modern theatre
of war. It is usually adopted by the weak or inferior party to break the power-base
of the superior party because the former does not possess the military credentials
to engage the latter in any open and conventional warfare. If the former does
adopt open war, it is likely to be at its own peril.
History has shown that guerrilla warfare has remained a viable vehicle for the
inferior party to force the superior party to make concessions. This was evident in
the eventual acceptance by the British imperialists under the tutelage of Kitchener
to make some concessions to the Boers to end hostility and by 1902, the Boer
guerrilla insurgents finally gave up the struggle, which demonstrated the strategic
importance of guerrilla tactic in modern armed conflict.
5.0 SUMMARY
In this unit, we have been able to treat the topic, guerrilla warfare extensively. We
began by explaining the meaning of guerrilla warfare. We went further to discuss
the various tactics and strategies that characterize the guerrilla warfare. We also
described the features as well as the ethical Problems of guerrilla warfare. Finally,
we examined various counter-guerrilla measures that can be taken to limit or
contain any guerrilla uprising. Thank you for your patience. I hope you have
found the topic very interesting?
193
CSS 243 Principles of Security Practice and Management
Describe Guerrilla Warfare. And what are the possible measures that can be taken
to counter guerilla aggression?
Asprey, Robert B. (1994), War in the Shadows, The Guerilla in History, William
Morrow.
Bing, Stanley (2004), Sun Tzu Was a Sissy: Conquer Your Enemies, Promote
Your Friends, and Wage the Real Art of War, New York: Harper Collins.
David, Steven R. (2002), "Fatal Choices: Israel's Policy of Targeted Killing", The
Begin-Sadat Centre for Strategic Studies, Bar-Ilan University. (September).
Mackey, Robert R. (2004). The UnCivil War: Irregular Warfare in the Upper
South, 1861–1865. Norman, Oklahoma: University of Oklahoma Press.
Smith, Rupert (General Sir) (2006), The Utility of Force: The Art of War in the
Modern World, Allen Lane, 2006.
.baader-meinhof.com/students/resources/pr int/minimanual/manualtext.html
://www.freepeoplesmovement.org/fpm/page.php?149
.marxists.org
194
CSS 243 Principles of Security Practice and Management
Unit 4
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Meaning of Fortification Tactic
3.2 Evolution of Fortification Tactic
3.3 Branches of Fortification
3.4 Obstacles of Permanent Fortifications
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Readings
1.0 INTRODUCTION
What I want to bring out here is that fortification is another tactic that can be
adopted by counter-insurgent party to put the activities of the insurgents in check.
This is done through provision of military constructions or fence to edge-out the
guerrillas as well as limiting the insurgents’ movement flow, which will deny the
guerrilla fighters free access to the party’s camp. This unit will discuss
extensively on fortification as a viable tactic of security management. So, fasten
your seat belt and let’s cruise.
2.0 OBJECTIVES
195
CSS 243 Principles of Security Practice and Management
The term fortification is derived from the Latin fortis ("strong") and facere ("to
make"). If we consider the two Latin words in our definition of fortification, we
are not wrong to say that fortification tactic involves constructive initiatives ‘to
make strong’ one’s side in the face of security threat through provisions of
defense or security buildings and installations to create artificial impediment to
the enemy’s movement or seek to prevent enemy’s attack.
The word fortification can also refer to the practice of enhancing or improving an
area's security with defensive works. City walls are fortifications but not
necessarily called fortresses. Looking at the subject matter from the home-front,
we see almost every household erecting fences and burglary-proof iron gates all
over the place. The aim of doing this is not basically to prevent burglars’ visit but
to prevent their easy access to the house. By doing so, not every common criminal
can gain access to the house.
Even, if sophisticated bandits are to visit the neighbourhood, they consider first,
the house with easier access, not without exceptions. One of the exceptions is that
if it is the major plan of the bandits to visit a particular house, no matter the forts
available or security structures put in place, they will strive to gain access to the
house. But this effort, not in all cases, is fruitful. Thus, the bandits may
experience strong fight from the occupants of the house they are visiting and they
(bandits) may decide to retreat or remain resilient, engaging the house occupants
in continued aggression until they gain access to the house.
By and large, the point we are trying to make here, is to create an aggression
scenario from our civil (domestic) experience. What we are driving at here, is that
countries often adopt fortification strategy to prevent any form of surprise attack
or invasion by enemy-party, and to give the defensive party an opportunity to
have a strategic advantage over the offensive party on the scale of military
probability.
In military context, fortification is defensive tactic against any attack from the
enemy’s camp. Fortification basically involves putting in place strategic defensive
system. Several military installations are known as forts, some of which are not
always fortified. Fort is the common military term for a detached fortified
building or enclosure of moderate size occupied or designed to be occupied by
196
CSS 243 Principles of Security Practice and Management
troops.
Fort can be permanent or temporal. There are two forms of fort. The first is the
larger fort, which is known as fortress. The second form is smaller fort, which is
also known as fortalice. Fortress is that form of fortification, of extraordinary size
and strength, regarded as permanent.
Forts are built in anticipation to prevent any external attack from the enemy.
Fortification has proved to be very effective as counter-guerrilla war strategy to
contain the activities of enemy-guerrilla insurgents as evident in the Boer War.
The war was between the British and Boer who were white settlers in South
Africa over imperial interests.
War broke out in 1899, and after two and a half years of armed hostility between
the two, the Boers were defeated (Strayer et al, 1961:392). Their capitals such as
Pretoria and Bloemfontein were thereafter occupied by the British. After the
defeat of the Boers by the British in conventional warfare, the former sought to
continue the military campaign this time, not through conventional method, but
by unconventional way-guerrilla tactic.
Guerrilla method really worked to the advantage of the Boers, particularly the
successes recorded by such insurgent units like the one led by Christian de Wet.
The insurgent operations against the British nonetheless attracted high casualty
rate among the British troops.
In response to the incessant guerrilla attacks from the Boers, the Kitchener led
British imperial forces had to adopt fortification tactic as alternative approach for
counter-insurgency. The British began by confining the Boer civilians into
concentration camps, and hundreds of houses were built all over the Transvaal
and Orange Free State. Then, Kitchener endorsed a scorched earth policy where
the Boer homes and farms were destroyed, bringing the insurgents to a bend.
Exercise
What is fortification tactic?
Fortification has been in existence, even from pre-historic era in human history.
From one period to another, human beings have continued to put in place various
197
CSS 243 Principles of Security Practice and Management
198
CSS 243 Principles of Security Practice and Management
Field fortifications are erected by troops in the field who may be assisted by local
labour and tools. This type of fortification does not require much resources to
prepare and it is temporal and less complex.
Exercise
Explain branches of fortification.
In this segment of the unit, we are to look at various factors that are responsible
for the less effective nature of fortifications in modern warfare. Though,
fortification can still be effective in checking the activities of the guerrillas but
can prove ineffective in modern conventional warfare due to the nature of modern
war itself. Some of the obstacles bedeviling the strategic importance of
fortifications may include:
The rise of mobile warfare since World War II has further subjected permanent
fortification to vulnerability because the might of the offensive party really
determines the fortification level of the defensive party. The offensive party could
channel its power to advance a breakthrough by breaking the ranks of a segment
of the defensive lines. Well, the main motive behind the adoption of fortification
is not to totally prevent enemy’s attack but to delay it, so that the defensive party
will have at least time to develop counter-attack measures to stop enemy’s
invasion.
199
CSS 243 Principles of Security Practice and Management
3) The development of war jets and missiles has adversely affected the strategic
importance of permanent fortification in modern battlefields. The powerful shell-
fires from the air can crush any permanent fortifications. Thus, war is now
conducted not only through the land or sea but also by air. Aerial bombings and
the destructive nature of some bombs and missiles makes permanent fortifications
vulnerable.
Exercise
Explain the obstacles of fortification tactic.
4.0 CONCLUSION
5.0 SUMMARY
In this unit, we have been able to focus on various aspects and issues of
fortification tactic. We explained the meaning of fortification tactic. We also
discussed the evolution of fortification tactic. Thereafter, we pointed our search
light on the branches of fortification. Finally, we examined the various obstacles
of permanent fortifications
Duffy, Christopher (1996), Fire & Stone: The Science of Fortress Warfare (1660–
200
CSS 243 Principles of Security Practice and Management
Keegan, John (1999), The Battle of the Frontiers and the Marine: The First World
War, New York: Random House.
Mueller, John (1989), Retreat from Doomsday: The Obsolescence of Major War,
New York: Basic Books.
Strayer, Joseph R.; Hans W. Gatzke; and E. Harris Harbison (1961), The Course
of Civilization (Volume Two), NewYork: Harcourt, Brace and World.
201
CSS 243 Principles of Security Practice and Management
Unit 5
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Body
3.1 Meaning of Manoeuvre Tactic
3.2 Differences between Maneuver Tactic and Attrition Tactic.
3.3 Elements of Maneuver Tactic
4.0 Conclusion
5.0 Summary
6.0 Tutored Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Manoeuvre is the term used by military theorists and tacticians, which means an
attempt or attempts where a party embarks on actions or measures to gain
positional advantage over the other party in armed conflict. These actions are
designed purposely to contain the movement of the enemy as well as to destroy its
fire-power such that the enemy will have very little or no military resources or
hardware to prosecute (further) aggression. This form of tactic is referred to as
theory of shock and awe. This unit shall focus on various issues in maneuver
tactic.
2.0 OBJECTIVES
Maneuver is a form of tactic where one of the (or both) parties in aggression seeks
to gain military advantage over the other not basically by attacking the enemy but
by destroying the armoury of the enemy-party before conducting any offensive
against the enemy-party. By do ing so, the enemy’s aggressive frequency must
have a subject of tactical interception from the other party. A good example is a
202
CSS 243 Principles of Security Practice and Management
brutal conflict between two families. Each of the families has a father, a mother,
and four children who are of the same height and weight (or, simply put, the same
size). The only difference is that one of the two families has three male children
while the other has two male children. The law of nature says that men should be
stronger than women physically (but not in all cases).
Thus, the second family is disadvantaged strategically by having two boys. If you
belong to the second family, what are you going to do to turn your strategic
disadvantage into advantage. Here, what the maneuver tells us is that we should
pay more attention on the enemy’s power-base rather than the enemy herself. A
maneuver tactician may decide not to engage the advantaged party first in any
physical battle. The first plan will be to set fire on the advantaged party’s house,
causing the entire household psychological defeat while its members run helter-
skelter to escape being consumed by fire.
The initially disadvantaged family may take advantage of the breakdown in the
command structure of the enemy party. Through strategic ambush, a substantial
number of the previously advantaged family may be killed, and cleansing
operation will then follow. In this case, the former disadvantaged party gained a
military advantage over the superior party. Any tactical miscalculation in security
management can be very risky and costly. And that is why nations now pay
greater attention on strategic intelligence. Superb security initiatives not backed
by intelligence are nothing but actions in futility.
In military context, the United States is popular in maneuver tactic. The US will
always begin its military offensive by first destroying the armoury and the
military hardware of its enemy-state. This is done mainly through air raids and
aerial bombings. Thereafter, the infantry and tanks are called upon to do the
finishing. In the Iraq war, the US was very innovative and novel in putting
‘unprecedented combination of speed, precision, surprise and flexibility’ into play
while ‘turning difficulties into opportunities’ (Cordesman, 2003). Cordesman
further explains that:
203
CSS 243 Principles of Security Practice and Management
The Iraq experience has been able to present the strategic and tactical importance
of maneuver in modern warfare. The Iraq forces that were substantially larger and
had a geographic advantage. This is because the war was taking place at their
home front. They were supposed to be more familiar with the terrain than the
foreign enemies. Nobody could have thought that Iraq would be defeated very
early unlike the case of the Gulf war of 1991. “Shock and Awe” tactic dominated
the whole maneuver proceedings. The cohesion as well as the communication
system of the Iraqi military had already been destroyed by the US bombings
before ground battle commenced. Their arms facilities were destroyed to the
extent that the Iraqi forces could not put up any strong challenge or resistance
against the US troops.
That event marked the beginning of earthly maneuver in the celestial hostility
between the good and bad or evil. Satan used that strategy to score a point against
God, such that if God can overlook the sin committed by man, similar grace
should also be extended to him-Satan for the sake of justice. But God too, was
very smart by decreeing that evil men will be subjected to eternal punishment-hell
fire along with Satan. This view is popular among Christians and Muslims.
Maneuver has remained prominent from one period to another. In the Franco-
204
CSS 243 Principles of Security Practice and Management
Prussian War, it was clear that Napoleon had repositioned the French forces to a
stronger one army, which could destabilize the enemy-party through its speed,
precision, and cohesive control. Napoleon as a war general also arranged his
forces into what today we would refer to 'Battle-Groups' of combined arms
formations to enable faster reaction time to enemy action.
Exercise
What is maneuver warfare?
c) Attrition is associated with moving masses of men and material against enemy
strong-points. The military success is determined by a number enemy forces
killed, the enemy’s infrastructure destroyed, and amount of territory occupied.
Maneuver is pre-occupied with rapid movement and advanced capabilities to
contain the enemy’s mobility, crushing the enemy’s fire-power arsenals and
complete the aggression with attrition elements;
d) Maneuver involves decentralized command structures with greater tactical artistry
while the attrition usually has more centralized command with less tactics;
e) Attrition deals with attempts of hitting and destroying the totality of the enemy-
parties. It includes destruction of enemy troops as well other social facilities while
maneuver is primarily concerned with destroying the power-base of the enemy
like bombing of the armoury, military complex, air base, submarine, war ships
without necessary destroying the social facilities; and
205
CSS 243 Principles of Security Practice and Management
Exercise
What are the differences between maneuver tactic and attrition tactic?
War theorist, Martin Van Creveld identifies six main elements of maneuver tactic:
c) Scoring vital points by attacking most important and weakly defended military
facilities of the enemy at the right time. Maneuver is sustained by the synergy of
Intelligence, communication, speed, precision, control, computers and advanced
military capabilities;
d) Surprise attacks form the basic part of maneuver tactic. Sometimes, surprise
attacks can be counter-productive. Risk assessment must be conducted before
embarking on surprise attacks;
e) Jointness of the forces is also a very important element of maneuver tactic; and
Exercise
What are the elements of maneuver tactic?
4.0 CONCLUSION
206
CSS 243 Principles of Security Practice and Management
5.0 SUMMARY
This unit has been to treat a variety of issues as regards the maneuver tactic. We
began by looking at the meaning of maneuver. Thereafter, we discussed the
differences between Maneuver tactic and Attrition tactic. We also explained the
elements of maneuver tactic insecurity management and defence. Mind you, you
are advised to engage yourself in further reading to complement what you have
studied in this unit.
Cordesman, Anthony H (2003), The Iraq War: Strategy, Tactics and Military
Lessons, Washington DC: Centre for Strategic and International Studies (CSIS).
207
CSS 243 Principles of Security Practice and Management
208